+
+
+
+
+
+ Financial
+
-
risk:Benefit: Something that acts as or causes benefits
go to full definition
@@ -1865,7 +2101,7 @@
FinancialImpact
-
+
@@ -2128,8 +2364,6 @@ Classes
-
-
@@ -3007,6 +3241,12 @@ Authorisation Failure
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
+ risk:IntegrityConcept
+ |
+ Broader/Parent types |
risk:OperationalSecurityRisk
→ dpv:RiskConcept
|
@@ -3088,6 +3328,33 @@ None
Broader/Parent types |
+ risk:DataBreach
+ → risk:AvailabilityConcept
+ |
+ Broader/Parent types |
+ risk:DataBreach
+ → risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
+ risk:DataBreach
+ → risk:IntegrityConcept
+ |
+ Broader/Parent types |
+ risk:DataBreach
+ → risk:SecurityBreach
+ → risk:AvailabilityConcept
+ |
+ Broader/Parent types |
+ risk:DataBreach
+ → risk:SecurityBreach
+ → risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
+ risk:DataBreach
+ → risk:SecurityBreach
+ → risk:IntegrityConcept
+ |
+ Broader/Parent types |
risk:DataBreach
→ risk:SecurityBreach
→ risk:OperationalSecurityRisk
@@ -3392,6 +3659,9 @@ Blackmail
|
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
|
@@ -3473,8 +3743,14 @@ Brute Force Authorisations
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
+ |
+ Broader/Parent types |
+ risk:IntegrityConcept
|
@@ -3724,6 +4000,9 @@ Coercion
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
|
@@ -3883,6 +4162,9 @@ Component Failure
Broader/Parent types |
+ risk:AvailabilityConcept
+ |
+ Broader/Parent types |
risk:OperationalSecurityRisk
→ dpv:RiskConcept
|
@@ -3955,6 +4237,9 @@ Component Malfunction
Broader/Parent types |
+ risk:AvailabilityConcept
+ |
+ Broader/Parent types |
risk:OperationalSecurityRisk
→ dpv:RiskConcept
|
@@ -4027,6 +4312,15 @@ Compromise Account
Broader/Parent types |
+ risk:AvailabilityConcept
+ |
+ Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
+ risk:IntegrityConcept
+ |
+ Broader/Parent types |
risk:OperationalSecurityRisk
→ dpv:RiskConcept
|
@@ -4108,6 +4402,9 @@ Compromise Account Credentials
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:OperationalSecurityRisk
→ dpv:RiskConcept
|
@@ -4189,6 +4486,33 @@ Confidentiality Breach
Broader/Parent types |
+ risk:DataBreach
+ → risk:AvailabilityConcept
+ |
+ Broader/Parent types |
+ risk:DataBreach
+ → risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
+ risk:DataBreach
+ → risk:IntegrityConcept
+ |
+ Broader/Parent types |
+ risk:DataBreach
+ → risk:SecurityBreach
+ → risk:AvailabilityConcept
+ |
+ Broader/Parent types |
+ risk:DataBreach
+ → risk:SecurityBreach
+ → risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
+ risk:DataBreach
+ → risk:SecurityBreach
+ → risk:IntegrityConcept
+ |
+ Broader/Parent types |
risk:DataBreach
→ risk:SecurityBreach
→ risk:OperationalSecurityRisk
@@ -4666,6 +4990,9 @@ Cryptojacking
|
Broader/Parent types |
+ risk:AvailabilityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
|
@@ -4825,6 +5152,18 @@ Data Breach
Broader/Parent types |
+ risk:SecurityBreach
+ → risk:AvailabilityConcept
+ |
+ Broader/Parent types |
+ risk:SecurityBreach
+ → risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
+ risk:SecurityBreach
+ → risk:IntegrityConcept
+ |
+ Broader/Parent types |
risk:SecurityBreach
→ risk:OperationalSecurityRisk
→ dpv:RiskConcept
@@ -4910,6 +5249,9 @@ Data Corruption
|
Broader/Parent types |
+ risk:IntegrityConcept
+ |
+ Broader/Parent types |
risk:OperationalSecurityRisk
→ dpv:RiskConcept
|
@@ -5069,6 +5411,9 @@ Denial of Service Attack (DoS)
Broader/Parent types |
+ risk:AvailabilityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
|
@@ -5092,7 +5437,7 @@ Denial of Service Attack (DoS)
Source |
- ISO/IEC 27005:2018, ISO/IEC 27005:2018 |
+ ISO/IEC 27005:2018 |
@@ -5385,6 +5730,9 @@ Distributed Denial of Service Attack (DDoS)
Broader/Parent types |
+ risk:AvailabilityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
|
@@ -5609,6 +5957,9 @@ Equipment Failure
Broader/Parent types |
+ risk:AvailabilityConcept
+ |
+ Broader/Parent types |
risk:OperationalSecurityRisk
→ dpv:RiskConcept
|
@@ -5693,6 +6044,9 @@ Equipment Malfunction
Broader/Parent types |
+ risk:AvailabilityConcept
+ |
+ Broader/Parent types |
risk:OperationalSecurityRisk
→ dpv:RiskConcept
|
@@ -6012,6 +6366,9 @@ Extorsion
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
|
@@ -6815,6 +7172,9 @@ Fraud
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
|
@@ -7499,6 +7859,9 @@ Identity Fraud
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:OperationalSecurityRisk
→ dpv:RiskConcept
|
@@ -7580,6 +7943,9 @@ Identity Theft
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:OperationalSecurityRisk
→ dpv:RiskConcept
|
@@ -7862,7 +8228,7 @@ Incident
Date Created |
- 2024-02-14 |
+ 2024-05-19 |
Date Modified |
@@ -9873,6 +10239,33 @@ None
Broader/Parent types |
+ risk:DataBreach
+ → risk:AvailabilityConcept
+ |
+ Broader/Parent types |
+ risk:DataBreach
+ → risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
+ risk:DataBreach
+ → risk:IntegrityConcept
+ |
+ Broader/Parent types |
+ risk:DataBreach
+ → risk:SecurityBreach
+ → risk:AvailabilityConcept
+ |
+ Broader/Parent types |
+ risk:DataBreach
+ → risk:SecurityBreach
+ → risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
+ risk:DataBreach
+ → risk:SecurityBreach
+ → risk:IntegrityConcept
+ |
+ Broader/Parent types |
risk:DataBreach
→ risk:SecurityBreach
→ risk:OperationalSecurityRisk
@@ -10085,6 +10478,9 @@ Intercept Communications
|
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
|
@@ -10141,74 +10537,6 @@ Intercept Communications
-
-
-
-
@@ -11284,8 +11612,17 @@ Malicious Code Attack
Broader/Parent types |
+ risk:AvailabilityConcept
+ |
+ Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
+ |
+ Broader/Parent types |
+ risk:IntegrityConcept
|
@@ -11365,8 +11702,17 @@ Malware Attack
Broader/Parent types |
+ risk:AvailabilityConcept
+ |
+ Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
+ |
+ Broader/Parent types |
+ risk:IntegrityConcept
|
@@ -12766,6 +13112,9 @@ Phishing Scam
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
|
@@ -13544,6 +13893,9 @@ Re-identification
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:OperationalSecurityRisk
→ dpv:RiskConcept
|
@@ -21592,8 +21944,14 @@ Sabotage
Broader/Parent types |
+ risk:AvailabilityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
+ |
+ Broader/Parent types |
+ risk:IntegrityConcept
|
@@ -21673,6 +22031,9 @@ Scam
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
|
@@ -21754,8 +22115,17 @@ Security Attack
Broader/Parent types |
+ risk:AvailabilityConcept
+ |
+ Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
+ |
+ Broader/Parent types |
+ risk:IntegrityConcept
|
@@ -21823,6 +22193,15 @@ Security Breach
Broader/Parent types |
+ risk:AvailabilityConcept
+ |
+ Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
+ risk:IntegrityConcept
+ |
+ Broader/Parent types |
risk:OperationalSecurityRisk
→ dpv:RiskConcept
|
@@ -22365,10 +22744,16 @@ Spoofing
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
|
Broader/Parent types |
+ risk:IntegrityConcept
+ |
+ Broader/Parent types |
risk:OperationalSecurityRisk
→ dpv:RiskConcept
|
@@ -22450,6 +22835,9 @@ System Failure
Broader/Parent types |
+ risk:AvailabilityConcept
+ |
+ Broader/Parent types |
risk:OperationalSecurityRisk
→ dpv:RiskConcept
|
@@ -22534,8 +22922,17 @@ System Intrusion
Broader/Parent types |
+ risk:AvailabilityConcept
+ |
+ Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
+ |
+ Broader/Parent types |
+ risk:IntegrityConcept
|
@@ -22615,6 +23012,9 @@ System Malfunction
Broader/Parent types |
+ risk:AvailabilityConcept
+ |
+ Broader/Parent types |
risk:OperationalSecurityRisk
→ dpv:RiskConcept
|
@@ -22933,8 +23333,17 @@ Unauthorised Access to Premises
Broader/Parent types |
+ risk:AvailabilityConcept
+ |
+ Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
+ |
+ Broader/Parent types |
+ risk:IntegrityConcept
|
@@ -23014,8 +23423,17 @@ Unauthorised Activity
Broader/Parent types |
+ risk:AvailabilityConcept
+ |
+ Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
+ |
+ Broader/Parent types |
+ risk:IntegrityConcept
|
@@ -23083,8 +23501,14 @@ Unauthorised Code Access
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
+ |
+ Broader/Parent types |
+ risk:IntegrityConcept
|
@@ -23164,6 +23588,9 @@ Unauthorised Code Disclosure
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
|
@@ -23247,6 +23674,9 @@ Unauthorised Code Modification
Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
+ |
+ Broader/Parent types |
+ risk:IntegrityConcept
|
@@ -23326,6 +23756,9 @@ Unauthorised Data Access
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
|
@@ -23407,6 +23840,9 @@ Unauthorised Data Disclosure
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
|
@@ -23490,6 +23926,9 @@ Unauthorised Data Modification
Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
+ |
+ Broader/Parent types |
+ risk:IntegrityConcept
|
@@ -23569,6 +24008,9 @@ Unauthorised Information Disclosure
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
|
@@ -23650,6 +24092,9 @@ Unauthorised Re-Identification
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
|
@@ -23728,6 +24173,9 @@ Unauthorised Resource Use
Broader/Parent types |
+ risk:AvailabilityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
|
@@ -23809,8 +24257,14 @@ Unauthorised System Access
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
+ |
+ Broader/Parent types |
+ risk:IntegrityConcept
|
@@ -23892,6 +24346,9 @@ Unauthorised System Modification
Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
+ |
+ Broader/Parent types |
+ risk:IntegrityConcept
|
@@ -23971,8 +24428,14 @@ Unwanted Code Deletion
Broader/Parent types |
+ risk:AvailabilityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
+ |
+ Broader/Parent types |
+ risk:IntegrityConcept
|
@@ -24052,8 +24515,14 @@ Unwanted Data Deletion
Broader/Parent types |
+ risk:AvailabilityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
+ |
+ Broader/Parent types |
+ risk:IntegrityConcept
|
@@ -24133,6 +24602,9 @@ Unwanted Disclosure of Data
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
|
@@ -25417,87 +25889,6 @@ Vulnerability
-
-
-
-
@@ -25630,8 +26021,6 @@ Properties
-
-
@@ -26435,9 +26824,6 @@ has vulnerability
-
-
-
@@ -27237,9 +27623,6 @@ refers to risk
-
-
-
@@ -27334,8 +27717,6 @@ External
-
-
@@ -27637,9 +28018,6 @@ External
-
-
-
@@ -28223,9 +28601,6 @@ External
-
-
-
diff --git a/2.1-dev/risk/index.html b/2.1-dev/risk/index.html
index c8b42bf5f..4efbea699 100644
--- a/2.1-dev/risk/index.html
+++ b/2.1-dev/risk/index.html
@@ -1271,92 +1271,77 @@ Consequences and Impacts
dpv:hasImpact risk:RightsImpact .
- The risk concepts taxonomy is broadly divided into the following categories:
+ The concepts taxonomy is broadly divided into the following categories:
-
- InternalSecurityThreat
-
+
+ CIA Model
+ Confidentiality
+
-
- risk:VulnerabilityCreated: Something that acts as or causes Vulnerability Created
- go to full definition
+ risk:AuthorisationFailure: Something that acts as or causes Authorisation Failure
+ go to full definition
-
-
-
-
- ExternalSecurityThreat
-
-
- risk:Blackmail: Something that acts as or causes Blackmail
- go to full definition
+ risk:ConfidentialityBreach: Something that acts as or causes Confidentiality Breach
+ go to full definition
-
- risk:BruteForceAuthorisations: Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques
- go to full definition
-
-
+ risk:DataBreach: Something that acts as or causes Data Breach
+ go to full definition
+
-
risk:Extorsion: Something that acts as or causes Extorsion
@@ -1367,6 +1352,16 @@
ExternalSecurityThreat
risk:Fraud: Something that acts as or causes Fraud
go to full definition
+
+ -
+ risk:IdentityFraud: Something that acts as or causes Identity Fraud
+ go to full definition
+
+
+ -
+ risk:IdentityTheft: Something that acts as or causes Identity Theft
+ go to full definition
+
-
risk:InterceptCommunications: Something that acts as or causes Interception of Communications
@@ -1389,8 +1384,8 @@
ExternalSecurityThreat
-
- risk:Sabotage: Something that acts as or causes Sabotage
- go to full definition
+ risk:Reidentification: Something that acts as or causes Re-identification
+ go to full definition
-
@@ -1402,6 +1397,33 @@
ExternalSecurityThreat
risk:SecurityAttack: Something that acts as or causes an attack on security with the aim of undermining it
go to full definition
+
+ -
+ risk:SecurityBreach: Something that acts as or causes Security Breach
+ go to full definition
+
-
risk:Spoofing: Something that acts as or causes Spoofing
@@ -1432,11 +1454,6 @@
ExternalSecurityThreat
risk:UnauthorisedCodeDisclosure: Something that acts as or causes Unauthorised Code Disclosure
go to full definition
-
- -
- risk:UnauthorisedCodeModification: Something that acts as or causes Unauthorised Code Modification
- go to full definition
-
-
risk:UnauthorisedDataAccess: Something that acts as or causes Unauthorised Data Access
@@ -1447,11 +1464,6 @@
ExternalSecurityThreat
risk:UnauthorisedDataDisclosure: Something that acts as or causes Unauthorised Data Disclosure
go to full definition
-
- -
- risk:UnauthorisedDataModification: Something that acts as or causes Unauthorised Data Modification
- go to full definition
-
-
risk:UnauthorisedInformationDisclosure: Something that acts as or causes Unauthorised Information Disclosure
@@ -1464,8 +1476,145 @@
ExternalSecurityThreat
-
- risk:UnauthorisedResourceUse: Something that acts as or causes Unauthorised Resource Use
- go to full definition
+ risk:UnauthorisedSystemAccess: Something that acts as or causes Unauthorised System Access
+ go to full definition
+
+
+ -
+ risk:UnwantedDisclosureData: Something that acts as or causes Unwanted Disclosure of Data
+ go to full definition
+
+
+
+
+ Integrity
+
+ -
+ risk:AuthorisationFailure: Something that acts as or causes Authorisation Failure
+ go to full definition
+
+
+ -
+ risk:BruteForceAuthorisations: Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques
+ go to full definition
+
+
+ -
+ risk:CompromiseAccount: Something that acts as or causes a compromised account that is then used by the compromiser
+ go to full definition
+
+
+ -
+ risk:DataBreach: Something that acts as or causes Data Breach
+ go to full definition
+
+
+ -
+ risk:DataCorruption: Something that acts as or causes Corruption of Data
+ go to full definition
+
+
+ -
+ risk:IntegrityBreach: None
+ go to full definition
+
+
+ -
+ risk:MaliciousCodeAttack: Something that acts as or causes Malicious Code Attack
+ go to full definition
+
+
+ -
+ risk:MalwareAttack: Something that acts as or causes Malware Attack
+ go to full definition
+
+
+ -
+ risk:Sabotage: Something that acts as or causes Sabotage
+ go to full definition
+
+
+ -
+ risk:SecurityAttack: Something that acts as or causes an attack on security with the aim of undermining it
+ go to full definition
+
+
+ -
+ risk:SecurityBreach: Something that acts as or causes Security Breach
+ go to full definition
+
+
+ -
+ risk:Spoofing: Something that acts as or causes Spoofing
+ go to full definition
+
+
+ -
+ risk:SystemIntrusion: Something that acts as or causes System Intrusion
+ go to full definition
+
+
+ -
+ risk:UnauthorisedAccesstoPremises: Something that acts as or causes Unauthorised Access to Premises
+ go to full definition
+
+
+ -
+ risk:UnauthorisedActivity: Something that acts as or causes Unauthorised Activity
+ go to full definition
+
+
+ -
+ risk:UnauthorisedCodeAccess: Something that acts as or causes Unauthorised Code Access
+ go to full definition
+
+
+ -
+ risk:UnauthorisedCodeModification: Something that acts as or causes Unauthorised Code Modification
+ go to full definition
+
+
+ -
+ risk:UnauthorisedDataModification: Something that acts as or causes Unauthorised Data Modification
+ go to full definition
-
@@ -1488,19 +1637,13 @@
ExternalSecurityThreat
go to full definition
- -
- risk:UnwantedDisclosureData: Something that acts as or causes Unwanted Disclosure of Data
- go to full definition
-
-
-
-
- OperationalSecurityRisk
-
+
+ Availability
+
-
- risk:AuthorisationFailure: Something that acts as or causes Authorisation Failure
- go to full definition
+ risk:AvailabilityBreach: None
+ go to full definition
-
@@ -1519,13 +1662,39 @@
OperationalSecurityRisk
-
- risk:CompromiseAccountCredentials: Something that acts as or causes Account Credentials to be compromised
- go to full definition
+ risk:Cryptojacking: Something that acts as or causes Cryptojacking
+ go to full definition
-
- risk:DataCorruption: Something that acts as or causes Corruption of Data
- go to full definition
+ risk:DataBreach: Something that acts as or causes Data Breach
+ go to full definition
+
+
+ -
+ risk:DenialServiceAttack: Something that acts as or causes Denial of Service Attack (DoS)
+ go to full definition
+
+
+ -
+ risk:DistributedDenialServiceAttack: Something that acts as or causes Distributed Denial of Service Attack (DDoS)
+ go to full definition
-
@@ -1539,18 +1708,23 @@
OperationalSecurityRisk
-
- risk:IdentityFraud: Something that acts as or causes Identity Fraud
- go to full definition
+ risk:MaliciousCodeAttack: Something that acts as or causes Malicious Code Attack
+ go to full definition
-
- risk:IdentityTheft: Something that acts as or causes Identity Theft
- go to full definition
+ risk:MalwareAttack: Something that acts as or causes Malware Attack
+ go to full definition
-
- risk:Reidentification: Something that acts as or causes Re-identification
- go to full definition
+ risk:Sabotage: Something that acts as or causes Sabotage
+ go to full definition
+
+
+ -
+ risk:SecurityAttack: Something that acts as or causes an attack on security with the aim of undermining it
+ go to full definition
-
@@ -1581,13 +1755,13 @@
OperationalSecurityRisk
-
- risk:Spoofing: Something that acts as or causes Spoofing
- go to full definition
+ risk:SystemFailure: Something that acts as or causes System Failure
+ go to full definition
-
- risk:SystemFailure: Something that acts as or causes System Failure
- go to full definition
+ risk:SystemIntrusion: Something that acts as or causes System Intrusion
+ go to full definition
-
@@ -1595,11 +1769,68 @@
OperationalSecurityRisk
go to full definition
+
-
+ risk:UnauthorisedAccesstoPremises: Something that acts as or causes Unauthorised Access to Premises
+ go to full definition
+
+
+
-
+ risk:UnauthorisedActivity: Something that acts as or causes Unauthorised Activity
+ go to full definition
+
+
+
-
+ risk:UnauthorisedResourceUse: Something that acts as or causes Unauthorised Resource Use
+ go to full definition
+
+
+
-
+ risk:UnwantedCodeDeletion: Something that acts as or causes Unwanted Code Deletion
+ go to full definition
+
+
+
-
+ risk:UnwantedDataDeletion: Something that acts as or causes Unwanted Data Deletion
+ go to full definition
+
+
-
-
- LegalRisk
-
+
+
+
+
+
+ Legal
+
-
risk:CopyrightViolation: Something that acts as or causes Copyright Violation
go to full definition
@@ -1666,10 +1897,11 @@
LegalRisk
-
-
- ReputationalRisk
-
+
+
+
+ Reputational
+
-
risk:LoseCredibility: Something that acts as or causes Loss of Credibility
go to full definition
@@ -1706,10 +1938,11 @@
ReputationalRisk
-
-
- SocietalRisk
-
+
+
+
+ Societal
+
-
risk:Discrimination: Something that acts as or causes Discrimination
go to full definition
@@ -1761,10 +1994,11 @@
SocietalRisk
-
-
- IndividualRisk
-
+
+
+
+ Individual
+
-
risk:Harm: Something that acts as or causes Harm to humans
go to full definition
@@ -1811,14 +2045,16 @@
IndividualRisk
-
-
-
- FinancialImpact
-
+
+
+
+
+
+ Financial
+
-
risk:Benefit: Something that acts as or causes benefits
go to full definition
@@ -1865,7 +2101,7 @@
FinancialImpact
-
+
@@ -2128,8 +2364,6 @@ Classes
-
-
@@ -3007,6 +3241,12 @@ Authorisation Failure
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
+ risk:IntegrityConcept
+ |
+ Broader/Parent types |
risk:OperationalSecurityRisk
→ dpv:RiskConcept
|
@@ -3088,6 +3328,33 @@ None
Broader/Parent types |
+ risk:DataBreach
+ → risk:AvailabilityConcept
+ |
+ Broader/Parent types |
+ risk:DataBreach
+ → risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
+ risk:DataBreach
+ → risk:IntegrityConcept
+ |
+ Broader/Parent types |
+ risk:DataBreach
+ → risk:SecurityBreach
+ → risk:AvailabilityConcept
+ |
+ Broader/Parent types |
+ risk:DataBreach
+ → risk:SecurityBreach
+ → risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
+ risk:DataBreach
+ → risk:SecurityBreach
+ → risk:IntegrityConcept
+ |
+ Broader/Parent types |
risk:DataBreach
→ risk:SecurityBreach
→ risk:OperationalSecurityRisk
@@ -3392,6 +3659,9 @@ Blackmail
|
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
|
@@ -3473,8 +3743,14 @@ Brute Force Authorisations
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
+ |
+ Broader/Parent types |
+ risk:IntegrityConcept
|
@@ -3724,6 +4000,9 @@ Coercion
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
|
@@ -3883,6 +4162,9 @@ Component Failure
Broader/Parent types |
+ risk:AvailabilityConcept
+ |
+ Broader/Parent types |
risk:OperationalSecurityRisk
→ dpv:RiskConcept
|
@@ -3955,6 +4237,9 @@ Component Malfunction
Broader/Parent types |
+ risk:AvailabilityConcept
+ |
+ Broader/Parent types |
risk:OperationalSecurityRisk
→ dpv:RiskConcept
|
@@ -4027,6 +4312,15 @@ Compromise Account
Broader/Parent types |
+ risk:AvailabilityConcept
+ |
+ Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
+ risk:IntegrityConcept
+ |
+ Broader/Parent types |
risk:OperationalSecurityRisk
→ dpv:RiskConcept
|
@@ -4108,6 +4402,9 @@ Compromise Account Credentials
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:OperationalSecurityRisk
→ dpv:RiskConcept
|
@@ -4189,6 +4486,33 @@ Confidentiality Breach
Broader/Parent types |
+ risk:DataBreach
+ → risk:AvailabilityConcept
+ |
+ Broader/Parent types |
+ risk:DataBreach
+ → risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
+ risk:DataBreach
+ → risk:IntegrityConcept
+ |
+ Broader/Parent types |
+ risk:DataBreach
+ → risk:SecurityBreach
+ → risk:AvailabilityConcept
+ |
+ Broader/Parent types |
+ risk:DataBreach
+ → risk:SecurityBreach
+ → risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
+ risk:DataBreach
+ → risk:SecurityBreach
+ → risk:IntegrityConcept
+ |
+ Broader/Parent types |
risk:DataBreach
→ risk:SecurityBreach
→ risk:OperationalSecurityRisk
@@ -4666,6 +4990,9 @@ Cryptojacking
|
Broader/Parent types |
+ risk:AvailabilityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
|
@@ -4825,6 +5152,18 @@ Data Breach
Broader/Parent types |
+ risk:SecurityBreach
+ → risk:AvailabilityConcept
+ |
+ Broader/Parent types |
+ risk:SecurityBreach
+ → risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
+ risk:SecurityBreach
+ → risk:IntegrityConcept
+ |
+ Broader/Parent types |
risk:SecurityBreach
→ risk:OperationalSecurityRisk
→ dpv:RiskConcept
@@ -4910,6 +5249,9 @@ Data Corruption
|
Broader/Parent types |
+ risk:IntegrityConcept
+ |
+ Broader/Parent types |
risk:OperationalSecurityRisk
→ dpv:RiskConcept
|
@@ -5069,6 +5411,9 @@ Denial of Service Attack (DoS)
Broader/Parent types |
+ risk:AvailabilityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
|
@@ -5092,7 +5437,7 @@ Denial of Service Attack (DoS)
Source |
- ISO/IEC 27005:2018, ISO/IEC 27005:2018 |
+ ISO/IEC 27005:2018 |
@@ -5385,6 +5730,9 @@ Distributed Denial of Service Attack (DDoS)
Broader/Parent types |
+ risk:AvailabilityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
|
@@ -5609,6 +5957,9 @@ Equipment Failure
Broader/Parent types |
+ risk:AvailabilityConcept
+ |
+ Broader/Parent types |
risk:OperationalSecurityRisk
→ dpv:RiskConcept
|
@@ -5693,6 +6044,9 @@ Equipment Malfunction
Broader/Parent types |
+ risk:AvailabilityConcept
+ |
+ Broader/Parent types |
risk:OperationalSecurityRisk
→ dpv:RiskConcept
|
@@ -6012,6 +6366,9 @@ Extorsion
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
|
@@ -6815,6 +7172,9 @@ Fraud
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
|
@@ -7499,6 +7859,9 @@ Identity Fraud
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:OperationalSecurityRisk
→ dpv:RiskConcept
|
@@ -7580,6 +7943,9 @@ Identity Theft
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:OperationalSecurityRisk
→ dpv:RiskConcept
|
@@ -7862,7 +8228,7 @@ Incident
Date Created |
- 2024-02-14 |
+ 2024-05-19 |
Date Modified |
@@ -9873,6 +10239,33 @@ None
Broader/Parent types |
+ risk:DataBreach
+ → risk:AvailabilityConcept
+ |
+ Broader/Parent types |
+ risk:DataBreach
+ → risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
+ risk:DataBreach
+ → risk:IntegrityConcept
+ |
+ Broader/Parent types |
+ risk:DataBreach
+ → risk:SecurityBreach
+ → risk:AvailabilityConcept
+ |
+ Broader/Parent types |
+ risk:DataBreach
+ → risk:SecurityBreach
+ → risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
+ risk:DataBreach
+ → risk:SecurityBreach
+ → risk:IntegrityConcept
+ |
+ Broader/Parent types |
risk:DataBreach
→ risk:SecurityBreach
→ risk:OperationalSecurityRisk
@@ -10085,6 +10478,9 @@ Intercept Communications
|
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
|
@@ -10141,74 +10537,6 @@ Intercept Communications
-
-
-
-
@@ -11284,8 +11612,17 @@ Malicious Code Attack
Broader/Parent types |
+ risk:AvailabilityConcept
+ |
+ Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
+ |
+ Broader/Parent types |
+ risk:IntegrityConcept
|
@@ -11365,8 +11702,17 @@ Malware Attack
Broader/Parent types |
+ risk:AvailabilityConcept
+ |
+ Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
+ |
+ Broader/Parent types |
+ risk:IntegrityConcept
|
@@ -12766,6 +13112,9 @@ Phishing Scam
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
|
@@ -13544,6 +13893,9 @@ Re-identification
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:OperationalSecurityRisk
→ dpv:RiskConcept
|
@@ -21592,8 +21944,14 @@ Sabotage
Broader/Parent types |
+ risk:AvailabilityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
+ |
+ Broader/Parent types |
+ risk:IntegrityConcept
|
@@ -21673,6 +22031,9 @@ Scam
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
|
@@ -21754,8 +22115,17 @@ Security Attack
Broader/Parent types |
+ risk:AvailabilityConcept
+ |
+ Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
+ |
+ Broader/Parent types |
+ risk:IntegrityConcept
|
@@ -21823,6 +22193,15 @@ Security Breach
Broader/Parent types |
+ risk:AvailabilityConcept
+ |
+ Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
+ risk:IntegrityConcept
+ |
+ Broader/Parent types |
risk:OperationalSecurityRisk
→ dpv:RiskConcept
|
@@ -22365,10 +22744,16 @@ Spoofing
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
|
Broader/Parent types |
+ risk:IntegrityConcept
+ |
+ Broader/Parent types |
risk:OperationalSecurityRisk
→ dpv:RiskConcept
|
@@ -22450,6 +22835,9 @@ System Failure
Broader/Parent types |
+ risk:AvailabilityConcept
+ |
+ Broader/Parent types |
risk:OperationalSecurityRisk
→ dpv:RiskConcept
|
@@ -22534,8 +22922,17 @@ System Intrusion
Broader/Parent types |
+ risk:AvailabilityConcept
+ |
+ Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
+ |
+ Broader/Parent types |
+ risk:IntegrityConcept
|
@@ -22615,6 +23012,9 @@ System Malfunction
Broader/Parent types |
+ risk:AvailabilityConcept
+ |
+ Broader/Parent types |
risk:OperationalSecurityRisk
→ dpv:RiskConcept
|
@@ -22933,8 +23333,17 @@ Unauthorised Access to Premises
Broader/Parent types |
+ risk:AvailabilityConcept
+ |
+ Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
+ |
+ Broader/Parent types |
+ risk:IntegrityConcept
|
@@ -23014,8 +23423,17 @@ Unauthorised Activity
Broader/Parent types |
+ risk:AvailabilityConcept
+ |
+ Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
+ |
+ Broader/Parent types |
+ risk:IntegrityConcept
|
@@ -23083,8 +23501,14 @@ Unauthorised Code Access
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
+ |
+ Broader/Parent types |
+ risk:IntegrityConcept
|
@@ -23164,6 +23588,9 @@ Unauthorised Code Disclosure
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
|
@@ -23247,6 +23674,9 @@ Unauthorised Code Modification
Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
+ |
+ Broader/Parent types |
+ risk:IntegrityConcept
|
@@ -23326,6 +23756,9 @@ Unauthorised Data Access
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
|
@@ -23407,6 +23840,9 @@ Unauthorised Data Disclosure
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
|
@@ -23490,6 +23926,9 @@ Unauthorised Data Modification
Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
+ |
+ Broader/Parent types |
+ risk:IntegrityConcept
|
@@ -23569,6 +24008,9 @@ Unauthorised Information Disclosure
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
|
@@ -23650,6 +24092,9 @@ Unauthorised Re-Identification
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
|
@@ -23728,6 +24173,9 @@ Unauthorised Resource Use
Broader/Parent types |
+ risk:AvailabilityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
|
@@ -23809,8 +24257,14 @@ Unauthorised System Access
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
+ |
+ Broader/Parent types |
+ risk:IntegrityConcept
|
@@ -23892,6 +24346,9 @@ Unauthorised System Modification
Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
+ |
+ Broader/Parent types |
+ risk:IntegrityConcept
|
@@ -23971,8 +24428,14 @@ Unwanted Code Deletion
Broader/Parent types |
+ risk:AvailabilityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
+ |
+ Broader/Parent types |
+ risk:IntegrityConcept
|
@@ -24052,8 +24515,14 @@ Unwanted Data Deletion
Broader/Parent types |
+ risk:AvailabilityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
+ |
+ Broader/Parent types |
+ risk:IntegrityConcept
|
@@ -24133,6 +24602,9 @@ Unwanted Disclosure of Data
Broader/Parent types |
+ risk:ConfidentialityConcept
+ |
+ Broader/Parent types |
risk:ExternalSecurityThreat
→ dpv:RiskConcept
|
@@ -25417,87 +25889,6 @@ Vulnerability
-
-
-
-
@@ -25630,8 +26021,6 @@ Properties
-
-
@@ -26435,9 +26824,6 @@ has vulnerability
-
-
-
@@ -27237,9 +27623,6 @@ refers to risk
-
-
-
@@ -27334,8 +27717,6 @@ External
-
-
@@ -27637,9 +28018,6 @@ External
-
-
-
@@ -28223,9 +28601,6 @@ External
-
-
-
diff --git a/2.1-dev/risk/modules/risk_consequences-owl.jsonld b/2.1-dev/risk/modules/risk_consequences-owl.jsonld
index e261bb3b6..eb1314cd5 100644
--- a/2.1-dev/risk/modules/risk_consequences-owl.jsonld
+++ b/2.1-dev/risk/modules/risk_consequences-owl.jsonld
@@ -1,9 +1,9 @@
[
{
- "@id": "https://w3id.org/dpv/risk/owl#IdentityFraud",
+ "@id": "https://w3id.org/dpv/risk/owl#PhishingScam",
"@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
"http://purl.org/dc/terms/contributor": [
@@ -25,7 +25,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:Nbc1a7f7ae94c4fde84913e9622b759f6"
+ "@id": "_:Nb657a11b610f419a86eb9ea4a94e7e37"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -35,7 +35,10 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk"
+ "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -47,34 +50,34 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Identity Fraud"
+ "@value": "Something that acts as or causes Phishing Scam"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Identity Fraud"
+ "@value": "Phishing Scam"
}
]
},
{
- "@id": "_:Nbc1a7f7ae94c4fde84913e9622b759f6",
+ "@id": "_:Nb657a11b610f419a86eb9ea4a94e7e37",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ENISA Threat Taxonomy 2016"
+ "@value": "ENISA Threat Landscape for Ransomware Attacks 2022"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view"
+ "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#LoseNegotiatingCapacity",
+ "@id": "https://w3id.org/dpv/risk/owl#Coercion",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
@@ -99,7 +102,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:Nd8a232e440f041b496b97da8007b588a"
+ "@id": "_:Nc78302d156fb497aae9594fa63bb9fa7"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -109,7 +112,10 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk"
+ "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -121,37 +127,37 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Loss of Negotiating Capacity"
+ "@value": "Something that acts as or causes Coercion"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Lose of Negotiating Capacity"
+ "@value": "Coercion"
}
]
},
{
- "@id": "_:Nd8a232e440f041b496b97da8007b588a",
+ "@id": "_:Nc78302d156fb497aae9594fa63bb9fa7",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ISO/IEC 27005:2018"
+ "@value": "ENISA Threat Taxonomy 2016"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.iso.org/standard/75281.html"
+ "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk",
+ "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat",
"@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -173,45 +179,23 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Risks and issues that arise during operational processes"
+ "@value": "Concepts associated with security threats that are likely to originate externally"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Operational Security Risk"
+ "@value": "External Security Threat"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedAccesstoPremises",
+ "@id": "https://w3id.org/dpv/risk/owl#EnvironmentalRisk",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
- "http://purl.org/dc/terms/contributor": [
- {
- "@value": "Harshvardhan J. Pandit"
- }
- ],
- "http://purl.org/dc/terms/created": [
- {
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
- }
- ],
- "http://purl.org/dc/terms/modified": [
- {
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-08-16"
- }
- ],
- "http://purl.org/dc/terms/source": [
- {
- "@id": "_:N2b8ae4e96b21406bb91bfdec8f460776"
- }
- ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk/owl#"
@@ -219,7 +203,7 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
+ "@id": "https://w3id.org/dpv/owl#RiskConcept"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -231,286 +215,266 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Unauthorised Access to Premises"
+ "@value": "Risks and issues that have their origin in environment or can affect the environment at large"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Unauthorised Access to Premises"
+ "@value": "Environmental Risk"
}
]
},
{
- "@id": "_:N2b8ae4e96b21406bb91bfdec8f460776",
+ "@id": "https://w3id.org/dpv/risk/owl#",
"@type": [
- "https://schema.org/WebPage"
+ "http://www.w3.org/ns/dx/prof/Profile",
+ "http://www.w3.org/2002/07/owl#Ontology"
],
- "https://schema.org/name": [
+ "http://purl.org/dc/terms/bibliographicCitation": [
{
- "@value": "ISO/IEC 27005:2018"
+ "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426"
}
],
- "https://schema.org/url": [
+ "http://purl.org/dc/terms/conformsTo": [
{
- "@value": "https://www.iso.org/standard/75281.html"
+ "@value": "http://www.w3.org/2004/02/skos/core"
+ },
+ {
+ "@id": "http://www.w3.org/2002/07/owl"
+ },
+ {
+ "@value": "http://www.w3.org/2000/01/rdf-schema"
}
- ]
- },
- {
- "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedResourceUse",
- "@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
- "http://www.w3.org/2000/01/rdf-schema#Class",
- "http://www.w3.org/2002/07/owl#Class"
],
"http://purl.org/dc/terms/contributor": [
+ {
+ "@value": "Julian Flake"
+ },
+ {
+ "@value": "Fajar Ekaputra"
+ },
{
"@value": "Harshvardhan J. Pandit"
+ },
+ {
+ "@value": "Beatriz Esteves"
+ },
+ {
+ "@value": "Axel Polleres"
+ },
+ {
+ "@value": "Georg P. Krog"
+ },
+ {
+ "@value": "Delaram Golpayegani"
}
],
"http://purl.org/dc/terms/created": [
{
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
+ "@language": "en",
+ "@value": "2022-08-14"
}
],
- "http://purl.org/dc/terms/modified": [
+ "http://purl.org/dc/terms/creator": [
{
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-08-16"
- }
- ],
- "http://purl.org/dc/terms/source": [
+ "@language": "en",
+ "@value": "Paul Ryan"
+ },
{
- "@id": "_:Nd4175f97fd33423f9014c3d690d56fad"
- }
- ],
- "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
+ "@language": "en",
+ "@value": "Georg P. Krog"
+ },
{
- "@id": "https://w3id.org/dpv/risk/owl#"
- }
- ],
- "http://www.w3.org/2000/01/rdf-schema#subClassOf": [
+ "@language": "en",
+ "@value": "Delaram Golpayegani"
+ },
{
- "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
- }
- ],
- "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
+ "@language": "en",
+ "@value": "Harshvardhan J. Pandit"
+ },
{
"@language": "en",
- "@value": "accepted"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#definition": [
+ "@value": "Beatriz Esteves"
+ },
{
"@language": "en",
- "@value": "Something that acts as or causes Unauthorised Resource Use"
+ "@value": "Rob Brennan"
+ },
+ {
+ "@language": "en",
+ "@value": "Julian Flake"
}
],
- "http://www.w3.org/2004/02/skos/core#prefLabel": [
+ "http://purl.org/dc/terms/description": [
{
"@language": "en",
- "@value": "Unauthorised Resource Use"
+ "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management"
}
- ]
- },
- {
- "@id": "_:Nd4175f97fd33423f9014c3d690d56fad",
- "@type": [
- "https://schema.org/WebPage"
],
- "https://schema.org/name": [
+ "http://purl.org/dc/terms/hasVersion": [
{
- "@value": "ISO/IEC 27005:2018"
+ "@id": "https://w3id.org/dpv/risk/owl#"
}
],
- "https://schema.org/url": [
+ "http://purl.org/dc/terms/identifier": [
{
- "@value": "https://www.iso.org/standard/75281.html"
+ "@value": "https://w3id.org/dpv/risk"
}
- ]
- },
- {
- "@id": "https://w3id.org/dpv/risk/owl#DataCorruption",
- "@type": [
- "http://www.w3.org/2000/01/rdf-schema#Class",
- "https://w3id.org/dpv/owl#RiskConcept",
- "http://www.w3.org/2002/07/owl#Class"
],
- "http://purl.org/dc/terms/contributor": [
+ "http://purl.org/dc/terms/issued": [
{
- "@value": "Harshvardhan J. Pandit"
+ "@language": "en",
+ "@value": "2022-08-14"
}
],
- "http://purl.org/dc/terms/created": [
+ "http://purl.org/dc/terms/license": [
{
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
+ "@id": "https://www.w3.org/copyright/document-license-2023/"
}
],
"http://purl.org/dc/terms/modified": [
{
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-08-16"
+ "@language": "en",
+ "@value": "2024-07-13"
}
],
- "http://purl.org/dc/terms/source": [
+ "http://purl.org/dc/terms/publisher": [
{
- "@id": "_:Ncd7b81f0daef4263a47284ebb48b83f6"
+ "@id": "https://www.w3.org/"
}
],
- "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
+ "http://purl.org/dc/terms/source": [
{
- "@id": "https://w3id.org/dpv/risk/owl#"
+ "@id": "https://www.w3.org/groups/cg/dpvcg/"
}
],
- "http://www.w3.org/2000/01/rdf-schema#subClassOf": [
+ "http://purl.org/dc/terms/title": [
{
- "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk"
+ "@language": "en",
+ "@value": "Risk Concepts"
}
],
- "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
+ "http://purl.org/ontology/bibo/doi": [
{
- "@language": "en",
- "@value": "modified"
+ "@value": "10.5281/zenodo.12505841"
}
],
- "http://www.w3.org/2004/02/skos/core#definition": [
+ "http://purl.org/ontology/bibo/status": [
{
- "@language": "en",
- "@value": "Something that acts as or causes Corruption of Data"
+ "@value": "http://purl.org/ontology/bibo/status/published"
}
],
- "http://www.w3.org/2004/02/skos/core#prefLabel": [
+ "http://purl.org/vocab/vann/preferredNamespacePrefix": [
{
- "@language": "en",
- "@value": "Data Corruption"
+ "@value": "risk"
}
],
- "http://www.w3.org/2004/02/skos/core#scopeNote": [
+ "http://purl.org/vocab/vann/preferredNamespaceUri": [
{
- "@language": "en",
- "@value": "This concept was called \"Corruption Data\" in DPV 2.0"
+ "@value": "https://w3id.org/dpv/risk#"
}
- ]
- },
- {
- "@id": "_:Ncd7b81f0daef4263a47284ebb48b83f6",
- "@type": [
- "https://schema.org/WebPage"
],
- "https://schema.org/name": [
+ "http://www.w3.org/2000/01/rdf-schema#Label": [
{
- "@value": "ISO/IEC 27005:2018"
+ "@language": "en",
+ "@value": "RISK"
}
],
- "https://schema.org/url": [
+ "http://www.w3.org/2002/07/owl#versionIRI": [
{
- "@value": "https://www.iso.org/standard/75281.html"
+ "@id": "https://w3id.org/dpv/2.1-dev/risk/owl#"
}
- ]
- },
- {
- "@id": "https://w3id.org/dpv/risk/owl#Fee",
- "@type": [
- "http://www.w3.org/2000/01/rdf-schema#Class",
- "https://w3id.org/dpv/owl#RiskConcept",
- "http://www.w3.org/2002/07/owl#Class"
],
- "http://purl.org/dc/terms/contributor": [
+ "http://www.w3.org/2002/07/owl#versionInfo": [
{
- "@value": "Georg P. Krog, Harshvardhan J. Pandit"
+ "@value": "2.1-dev"
}
],
- "http://purl.org/dc/terms/created": [
+ "http://www.w3.org/ns/dx/prof/hasResource": [
{
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-04-14"
- }
- ],
- "http://purl.org/dc/terms/modified": [
+ "@id": "https://w3id.org/dpv/examples"
+ },
{
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-08-16"
- }
- ],
- "http://purl.org/dc/terms/source": [
+ "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld"
+ },
{
- "@language": "en",
- "@value": "DGA 2.10"
- }
- ],
- "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
+ "@id": "https://w3id.org/dpv/primer"
+ },
{
- "@id": "https://w3id.org/dpv/risk/owl#"
- }
- ],
- "http://www.w3.org/2000/01/rdf-schema#subClassOf": [
+ "@id": "https://w3id.org/dpv/guides"
+ },
{
- "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact"
+ "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#serialisation-html"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf"
}
],
- "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
+ "http://www.w3.org/ns/dx/prof/isProfileOf": [
{
- "@language": "en",
- "@value": "modified"
+ "@id": "http://www.w3.org/2002/07/owl"
+ },
+ {
+ "@id": "https://w3id.org/dpv/owl"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#"
}
],
- "http://www.w3.org/2004/02/skos/core#definition": [
+ "http://xmlns.com/foaf/0.1/logo": [
{
- "@language": "en",
- "@value": "Something that acts as or provides fees e.g. for using a service"
+ "@id": "https://w3id.org/dpv/media/logo.png"
}
],
- "http://www.w3.org/2004/02/skos/core#prefLabel": [
+ "https://schema.org/version": [
{
- "@language": "en",
- "@value": "Fee"
+ "@value": "2.1-dev"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat",
+ "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld",
"@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
- "http://www.w3.org/2000/01/rdf-schema#Class",
- "http://www.w3.org/2002/07/owl#Class"
+ "http://www.w3.org/ns/dx/prof/ResourceDescriptor"
],
- "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
+ "http://purl.org/dc/terms/conformsTo": [
{
- "@id": "https://w3id.org/dpv/risk/owl#"
+ "@id": "https://www.w3.org/TR/json-ld11/"
}
],
- "http://www.w3.org/2000/01/rdf-schema#subClassOf": [
+ "http://purl.org/dc/terms/format": [
{
- "@id": "https://w3id.org/dpv/owl#RiskConcept"
+ "@id": "https://www.iana.org/assignments/media-types/application/ld+json"
}
],
- "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
+ "http://purl.org/dc/terms/title": [
{
- "@language": "en",
- "@value": "accepted"
+ "@value": "Risk Concepts - JSON-LD serialiation"
}
],
- "http://www.w3.org/2004/02/skos/core#definition": [
+ "http://www.w3.org/ns/dx/prof/hasArtifact": [
{
- "@language": "en",
- "@value": "Concepts associated with security threats that are likely to originate externally"
+ "@id": "https://w3id.org/dpv/risk/risk-owl.jsonld"
}
],
- "http://www.w3.org/2004/02/skos/core#prefLabel": [
+ "http://www.w3.org/ns/dx/prof/hasRole": [
{
- "@language": "en",
- "@value": "External Security Threat"
+ "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#PhishingScam",
+ "@id": "https://w3id.org/dpv/risk/owl#LoseOpportunity",
"@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
"http://purl.org/dc/terms/contributor": [
@@ -532,7 +496,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N2039355de6a7474a8ab35355297e33c6"
+ "@id": "_:N2ea871931e3746e4aff469f67008e44f"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -542,7 +506,7 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
+ "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -554,34 +518,34 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Phishing Scam"
+ "@value": "Something that acts as or causes Loss of Opportunity"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Phishing Scam"
+ "@value": "Lose of Opportunity"
}
]
},
{
- "@id": "_:N2039355de6a7474a8ab35355297e33c6",
+ "@id": "_:N2ea871931e3746e4aff469f67008e44f",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ENISA Threat Landscape for Ransomware Attacks 2022"
+ "@value": "ISO/IEC 27005:2018"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks"
+ "@value": "https://www.iso.org/standard/75281.html"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#RightsExercisePrevention",
+ "@id": "https://w3id.org/dpv/risk/owl#ViolatingLegalObligation",
"@type": [
"https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -589,13 +553,13 @@
],
"http://purl.org/dc/terms/contributor": [
{
- "@value": "Georg P. Krog, Harshvardhan J. Pandit"
+ "@value": "Harshvardhan J. Pandit"
}
],
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-18"
+ "@value": "2022-08-17"
}
],
"http://purl.org/dc/terms/modified": [
@@ -604,6 +568,11 @@
"@value": "2024-08-16"
}
],
+ "http://purl.org/dc/terms/source": [
+ {
+ "@id": "_:N0b5dd4cc254540f49140434e86708abb"
+ }
+ ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk/owl#"
@@ -611,39 +580,86 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk"
+ "@id": "https://w3id.org/dpv/risk/owl#LegalRisk"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
{
"@language": "en",
- "@value": "accepted"
+ "@value": "modified"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Prevent Exercising of Rights"
+ "@value": "Something that acts as or causes Violation of Legal Obligations"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Prevent Exercising of Rights"
+ "@value": "Violation of Legal Obligations"
}
],
"http://www.w3.org/2004/02/skos/core#scopeNote": [
{
"@language": "en",
- "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0"
+ "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#UnwantedDataDeletion",
+ "@id": "_:N0b5dd4cc254540f49140434e86708abb",
+ "@type": [
+ "https://schema.org/WebPage"
+ ],
+ "https://schema.org/name": [
+ {
+ "@value": "ISO/IEC 27005:2018"
+ }
+ ],
+ "https://schema.org/url": [
+ {
+ "@value": "https://www.iso.org/standard/75281.html"
+ }
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/examples",
+ "@type": [
+ "http://www.w3.org/ns/dx/prof/ResourceDescriptor"
+ ],
+ "http://purl.org/dc/terms/conformsTo": [
+ {
+ "@id": "https://www.w3.org/TR/html/"
+ }
+ ],
+ "http://purl.org/dc/terms/format": [
+ {
+ "@id": "https://www.iana.org/assignments/media-types/text/html"
+ }
+ ],
+ "http://purl.org/dc/terms/title": [
+ {
+ "@value": "Examples for Data Privacy Vocabulary"
+ }
+ ],
+ "http://www.w3.org/ns/dx/prof/hasArtifact": [
+ {
+ "@id": "https://w3id.org/dpv/examples"
+ }
+ ],
+ "http://www.w3.org/ns/dx/prof/hasRole": [
+ {
+ "@id": "http://www.w3.org/ns/dx/prof/role/guidance"
+ }
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#Terrorism",
"@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
"http://purl.org/dc/terms/contributor": [
@@ -665,7 +681,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N7ff2bed0d152400e90aff3c52f1320b0"
+ "@id": "_:N84e706a33b7c462194d2c8fb5c04326c"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -675,7 +691,7 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
+ "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -687,18 +703,18 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Unwanted Data Deletion"
+ "@value": "Something that acts as or causes Terrorism"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Unwanted Data Deletion"
+ "@value": "Terrorism"
}
]
},
{
- "@id": "_:N7ff2bed0d152400e90aff3c52f1320b0",
+ "@id": "_:N84e706a33b7c462194d2c8fb5c04326c",
"@type": [
"https://schema.org/WebPage"
],
@@ -714,10 +730,10 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#Sabotage",
+ "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeDisclosure",
"@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
"http://purl.org/dc/terms/contributor": [
@@ -739,7 +755,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:Nddcd9454cd3f48779b8299743d6f1150"
+ "@id": "_:Nc4c391b305be479eb0e623d887a478ac"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -750,6 +766,9 @@
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
"@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -761,37 +780,67 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Sabotage"
+ "@value": "Something that acts as or causes Unauthorised Code Disclosure"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Sabotage"
+ "@value": "Unauthorised Code Disclosure"
}
]
},
{
- "@id": "_:Nddcd9454cd3f48779b8299743d6f1150",
+ "@id": "_:Nc4c391b305be479eb0e623d887a478ac",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ENISA Reference Incident Classification Taxonomy 2018"
+ "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
+ "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#SystemFailure",
+ "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk",
+ "@type": [
+ "http://www.w3.org/2000/01/rdf-schema#Class",
+ "http://www.w3.org/2002/07/owl#Class"
+ ],
+ "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#"
+ }
+ ],
+ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
+ {
+ "@language": "en",
+ "@value": "accepted"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#definition": [
+ {
+ "@language": "en",
+ "@value": "Risks and issues that affect or have the potential to affect specific individuals"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#prefLabel": [
+ {
+ "@language": "en",
+ "@value": "Individual Risk"
+ }
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#MaterialDamage",
"@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
"http://purl.org/dc/terms/contributor": [
@@ -802,7 +851,7 @@
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
+ "@value": "2022-03-30"
}
],
"http://purl.org/dc/terms/modified": [
@@ -811,11 +860,6 @@
"@value": "2024-08-16"
}
],
- "http://purl.org/dc/terms/source": [
- {
- "@id": "_:Ndb0e0e85d6ad4dabbf9efc7a0f2cb59a"
- }
- ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk/owl#"
@@ -823,7 +867,7 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk"
+ "@id": "https://w3id.org/dpv/risk/owl#LegalRisk"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -835,54 +879,38 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes System Failure"
+ "@value": "Something that acts as or causes Material Damage"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "System Failure"
+ "@value": "Material Damage"
}
],
"http://www.w3.org/2004/02/skos/core#scopeNote": [
{
"@language": "en",
- "@value": "Here system refers to both hardware and software systems"
+ "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms"
}
]
},
{
- "@id": "_:Ndb0e0e85d6ad4dabbf9efc7a0f2cb59a",
+ "@id": "https://w3id.org/dpv/risk/owl#DistributedDenialServiceAttack",
"@type": [
- "https://schema.org/WebPage"
+ "http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
+ "http://www.w3.org/2002/07/owl#Class"
],
- "https://schema.org/name": [
+ "http://purl.org/dc/terms/contributor": [
{
- "@value": "ENISA Threat Landscape for Ransomware Attacks 2022"
+ "@value": "Harshvardhan J. Pandit"
}
],
- "https://schema.org/url": [
+ "http://purl.org/dc/terms/created": [
{
- "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks"
- }
- ]
- },
- {
- "@id": "https://w3id.org/dpv/risk/owl#LoseOpportunity",
- "@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
- "http://www.w3.org/2000/01/rdf-schema#Class",
- "http://www.w3.org/2002/07/owl#Class"
- ],
- "http://purl.org/dc/terms/contributor": [
- {
- "@value": "Harshvardhan J. Pandit"
- }
- ],
- "http://purl.org/dc/terms/created": [
- {
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2022-08-17"
}
],
"http://purl.org/dc/terms/modified": [
@@ -893,7 +921,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N0e6dade5a2814d0f815e1c5dd41f1c65"
+ "@id": "_:N64ebcf10636d495599fc0fd262e44103"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -903,7 +931,10 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk"
+ "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -915,18 +946,18 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Loss of Opportunity"
+ "@value": "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Lose of Opportunity"
+ "@value": "Distributed Denial of Service Attack (DDoS)"
}
]
},
{
- "@id": "_:N0e6dade5a2814d0f815e1c5dd41f1c65",
+ "@id": "_:N64ebcf10636d495599fc0fd262e44103",
"@type": [
"https://schema.org/WebPage"
],
@@ -942,12 +973,34 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#IndividualHealthSafety",
+ "@id": "https://w3id.org/dpv/risk/owl#ViolatingEthicsCode",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
+ "http://purl.org/dc/terms/contributor": [
+ {
+ "@value": "Harshvardhan J. Pandit"
+ }
+ ],
+ "http://purl.org/dc/terms/created": [
+ {
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2022-08-17"
+ }
+ ],
+ "http://purl.org/dc/terms/modified": [
+ {
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2024-08-16"
+ }
+ ],
+ "http://purl.org/dc/terms/source": [
+ {
+ "@id": "_:N5971f1bb7e3149b49a4335be11b0926f"
+ }
+ ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk/owl#"
@@ -955,89 +1008,100 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk"
+ "@id": "https://w3id.org/dpv/risk/owl#LegalRisk"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
{
"@language": "en",
- "@value": "accepted"
+ "@value": "modified"
}
],
- "http://www.w3.org/2004/02/skos/core#prefLabel": [
+ "http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Individual Health & Safety"
- }
- ]
- },
- {
- "@id": "https://w3id.org/dpv/examples",
- "@type": [
- "http://www.w3.org/ns/dx/prof/ResourceDescriptor"
- ],
- "http://purl.org/dc/terms/conformsTo": [
- {
- "@id": "https://www.w3.org/TR/html/"
+ "@value": "Something that acts as or causes Violation of Ethics Code"
}
],
- "http://purl.org/dc/terms/format": [
+ "http://www.w3.org/2004/02/skos/core#prefLabel": [
{
- "@id": "https://www.iana.org/assignments/media-types/text/html"
+ "@language": "en",
+ "@value": "Violating Ethics Code"
}
],
- "http://purl.org/dc/terms/title": [
+ "http://www.w3.org/2004/02/skos/core#scopeNote": [
{
- "@value": "Examples for Data Privacy Vocabulary"
+ "@language": "en",
+ "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0"
}
+ ]
+ },
+ {
+ "@id": "_:N5971f1bb7e3149b49a4335be11b0926f",
+ "@type": [
+ "https://schema.org/WebPage"
],
- "http://www.w3.org/ns/dx/prof/hasArtifact": [
+ "https://schema.org/name": [
{
- "@id": "https://w3id.org/dpv/examples"
+ "@value": "ISO/IEC 27005:2018"
}
],
- "http://www.w3.org/ns/dx/prof/hasRole": [
+ "https://schema.org/url": [
{
- "@id": "http://www.w3.org/ns/dx/prof/role/guidance"
+ "@value": "https://www.iso.org/standard/75281.html"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld",
+ "@id": "https://w3id.org/dpv/risk/owl#ComponentMalfunction",
"@type": [
- "http://www.w3.org/ns/dx/prof/ResourceDescriptor"
+ "http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
+ "http://www.w3.org/2002/07/owl#Class"
],
- "http://purl.org/dc/terms/conformsTo": [
+ "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
- "@id": "https://www.w3.org/TR/json-ld11/"
+ "@id": "https://w3id.org/dpv/risk/owl#"
}
],
- "http://purl.org/dc/terms/format": [
+ "http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://www.iana.org/assignments/media-types/application/ld+json"
+ "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk"
}
],
- "http://purl.org/dc/terms/title": [
+ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
{
- "@value": "Risk Concepts - JSON-LD serialiation"
+ "@language": "en",
+ "@value": "accepted"
}
],
- "http://www.w3.org/ns/dx/prof/hasArtifact": [
+ "http://www.w3.org/2004/02/skos/core#definition": [
{
- "@id": "https://w3id.org/dpv/risk/risk-owl.jsonld"
+ "@language": "en",
+ "@value": "Something that acts as or causes Component Malfunction"
}
],
- "http://www.w3.org/ns/dx/prof/hasRole": [
+ "http://www.w3.org/2004/02/skos/core#prefLabel": [
{
- "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary"
+ "@language": "en",
+ "@value": "Component Malfunction"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#scopeNote": [
+ {
+ "@language": "en",
+ "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#BruteForceAuthorisations",
+ "@id": "https://w3id.org/dpv/risk/owl#Damage",
"@type": [
- "http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
+ "http://www.w3.org/2000/01/rdf-schema#Class",
"http://www.w3.org/2002/07/owl#Class"
],
"http://purl.org/dc/terms/contributor": [
@@ -1048,7 +1112,7 @@
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
+ "@value": "2022-03-30"
}
],
"http://purl.org/dc/terms/modified": [
@@ -1057,11 +1121,6 @@
"@value": "2024-08-16"
}
],
- "http://purl.org/dc/terms/source": [
- {
- "@id": "_:Ned6a23a4f6894305bc5d07abc6872b8e"
- }
- ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk/owl#"
@@ -1069,7 +1128,7 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
+ "@id": "https://w3id.org/dpv/risk/owl#LegalRisk"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -1081,37 +1140,21 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"
+ "@value": "Something that acts as or causes Damage"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Brute Force Authorisations"
- }
- ]
- },
- {
- "@id": "_:Ned6a23a4f6894305bc5d07abc6872b8e",
- "@type": [
- "https://schema.org/WebPage"
- ],
- "https://schema.org/name": [
- {
- "@value": "ENISA Reference Incident Classification Taxonomy 2018"
- }
- ],
- "https://schema.org/url": [
- {
- "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
+ "@value": "Damage"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#SystemMalfunction",
+ "@id": "https://w3id.org/dpv/risk/owl#SexualViolence",
"@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
"http://purl.org/dc/terms/contributor": [
@@ -1133,7 +1176,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N1c2325e64024454ebc2e79f9e388cf3b"
+ "@id": "_:Ncb4b4f28b9894b79bfd2a5d2dd41f88f"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -1143,7 +1186,7 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk"
+ "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -1155,40 +1198,34 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes System Malfunction"
+ "@value": "Something that acts as or causes Sexual Violence"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "System Malfunction"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#scopeNote": [
- {
- "@language": "en",
- "@value": "Here system refers to both hardware and software systems"
+ "@value": "Sexual Violence"
}
]
},
{
- "@id": "_:N1c2325e64024454ebc2e79f9e388cf3b",
+ "@id": "_:Ncb4b4f28b9894b79bfd2a5d2dd41f88f",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ISO/IEC 27005:2018"
+ "@value": "ENISA Reference Incident Classification Taxonomy 2018"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.iso.org/standard/75281.html"
+ "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedInformationDisclosure",
+ "@id": "https://w3id.org/dpv/risk/owl#LoseGoodwill",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
@@ -1213,7 +1250,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:Nb2d6659136cf4d2fa881ae5798bf0e58"
+ "@id": "_:N194bc10f01ef4bdb99f12487816e6826"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -1223,7 +1260,7 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
+ "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -1235,69 +1272,39 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Unauthorised Information Disclosure"
+ "@value": "Something that acts as or causes Loss of Goodwill"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Unauthorised Information Disclosure"
+ "@value": "Lose of Goodwill"
}
]
},
{
- "@id": "_:Nb2d6659136cf4d2fa881ae5798bf0e58",
+ "@id": "_:N194bc10f01ef4bdb99f12487816e6826",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ENISA Reference Incident Classification Taxonomy 2018"
+ "@value": "ISO/IEC 27005:2018"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
+ "@value": "https://www.iso.org/standard/75281.html"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#SocietalHealthSafety",
+ "@id": "https://w3id.org/dpv/risk/owl#DataCorruption",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
- "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
- {
- "@id": "https://w3id.org/dpv/risk/owl#"
- }
- ],
- "http://www.w3.org/2000/01/rdf-schema#subClassOf": [
- {
- "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk"
- }
- ],
- "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
- {
- "@language": "en",
- "@value": "accepted"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#prefLabel": [
- {
- "@language": "en",
- "@value": "Societal Health & Safety"
- }
- ]
- },
- {
- "@id": "https://w3id.org/dpv/risk/owl#EquipmentFailure",
- "@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
- "http://www.w3.org/2000/01/rdf-schema#Class",
- "http://www.w3.org/2002/07/owl#Class"
- ],
"http://purl.org/dc/terms/contributor": [
{
"@value": "Harshvardhan J. Pandit"
@@ -1317,7 +1324,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:Nc281053cb7ff4095b5eef42624c4ff46"
+ "@id": "_:N8aaec0d1fefb4744abcf3099509b1988"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -1326,6 +1333,9 @@
}
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept"
+ },
{
"@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk"
}
@@ -1333,30 +1343,30 @@
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
{
"@language": "en",
- "@value": "accepted"
+ "@value": "modified"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Equipment Failure"
+ "@value": "Something that acts as or causes Corruption of Data"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Equipment Failure"
+ "@value": "Data Corruption"
}
],
"http://www.w3.org/2004/02/skos/core#scopeNote": [
{
"@language": "en",
- "@value": "Here equipment refers to physical equipment"
+ "@value": "This concept was called \"Corruption Data\" in DPV 2.0"
}
]
},
{
- "@id": "_:Nc281053cb7ff4095b5eef42624c4ff46",
+ "@id": "_:N8aaec0d1fefb4744abcf3099509b1988",
"@type": [
"https://schema.org/WebPage"
],
@@ -1372,10 +1382,10 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#Injury",
+ "@id": "https://w3id.org/dpv/risk/owl#PersonalSafetyEndangerment",
"@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
"http://purl.org/dc/terms/contributor": [
@@ -1397,7 +1407,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N1ef56bb9fadb431ba4c270603c7acdec"
+ "@id": "_:Na783f8da28594e8794173492db9ecac9"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -1407,7 +1417,7 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk"
+ "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -1419,18 +1429,18 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Injury"
+ "@value": "Something that acts as or causes Personal Safety Endangerment"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Injury"
+ "@value": "Personal Safety Endangerment"
}
]
},
{
- "@id": "_:N1ef56bb9fadb431ba4c270603c7acdec",
+ "@id": "_:Na783f8da28594e8794173492db9ecac9",
"@type": [
"https://schema.org/WebPage"
],
@@ -1446,7 +1456,7 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#Blackmail",
+ "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityBreach",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
@@ -1471,7 +1481,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N3ef9f5a9eb554279905f69c263712205"
+ "@id": "_:N0571680fc6554da2a384a2e851d510c0"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -1481,7 +1491,10 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
+ "@id": "https://w3id.org/dpv/risk/owl#DataBreach"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -1493,18 +1506,18 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Blackmail"
+ "@value": "Something that acts as or causes Confidentiality Breach"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Blackmail"
+ "@value": "Confidentiality Breach"
}
]
},
{
- "@id": "_:N3ef9f5a9eb554279905f69c263712205",
+ "@id": "_:N0571680fc6554da2a384a2e851d510c0",
"@type": [
"https://schema.org/WebPage"
],
@@ -1520,21 +1533,21 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#ErroneousSystemUse",
+ "@id": "https://w3id.org/dpv/risk/owl#Misuse",
"@type": [
- "http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
+ "http://www.w3.org/2000/01/rdf-schema#Class",
"http://www.w3.org/2002/07/owl#Class"
],
"http://purl.org/dc/terms/contributor": [
{
- "@value": "Harshvardhan J. Pandit"
+ "@value": "Delaram Golpayegani"
}
],
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
+ "@value": "2024-06-11"
}
],
"http://purl.org/dc/terms/modified": [
@@ -1543,11 +1556,6 @@
"@value": "2024-08-16"
}
],
- "http://purl.org/dc/terms/source": [
- {
- "@id": "_:Ne874eff2b0f74da79392c36cf77d71f1"
- }
- ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk/owl#"
@@ -1567,37 +1575,21 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Erroneous System Use"
+ "@value": "Something that acts as or causes Misuse"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Erroneous System Use"
- }
- ]
- },
- {
- "@id": "_:Ne874eff2b0f74da79392c36cf77d71f1",
- "@type": [
- "https://schema.org/WebPage"
- ],
- "https://schema.org/name": [
- {
- "@value": "ISO/IEC 27005:2018"
- }
- ],
- "https://schema.org/url": [
- {
- "@value": "https://www.iso.org/standard/75281.html"
+ "@value": "Misuse"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityBreach",
+ "@id": "https://w3id.org/dpv/risk/owl#EquipmentMalfunction",
"@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
"http://purl.org/dc/terms/contributor": [
@@ -1619,7 +1611,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N804ad242900c474395dd117c74dace8e"
+ "@id": "_:N53bfad5db8324151841ce01472d06f41"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -1629,7 +1621,10 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#DataBreach"
+ "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -1641,18 +1636,24 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Confidentiality Breach"
+ "@value": "Something that acts as or causes Equipment Malfunction"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Confidentiality Breach"
+ "@value": "Equipment Malfunction"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#scopeNote": [
+ {
+ "@language": "en",
+ "@value": "Here equipment refers to physical equipment"
}
]
},
{
- "@id": "_:N804ad242900c474395dd117c74dace8e",
+ "@id": "_:N53bfad5db8324151841ce01472d06f41",
"@type": [
"https://schema.org/WebPage"
],
@@ -1668,7 +1669,7 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemAccess",
+ "@id": "https://w3id.org/dpv/risk/owl#ViolatingStatutoryObligations",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
@@ -1693,7 +1694,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N4387faf4bb854435bfdc47ebf666782a"
+ "@id": "_:Ne3511d0b904a403e93b1538888ad1023"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -1703,30 +1704,36 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
+ "@id": "https://w3id.org/dpv/risk/owl#LegalRisk"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
{
"@language": "en",
- "@value": "accepted"
+ "@value": "modified"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Unauthorised System Access"
+ "@value": "Something that acts as or causes Violation of Statutory Obligations"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Unauthorised System Access"
+ "@value": "Violation of Statutory Obligations"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#scopeNote": [
+ {
+ "@language": "en",
+ "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0"
}
]
},
{
- "@id": "_:N4387faf4bb854435bfdc47ebf666782a",
+ "@id": "_:Ne3511d0b904a403e93b1538888ad1023",
"@type": [
"https://schema.org/WebPage"
],
@@ -1742,41 +1749,33 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk",
+ "@id": "https://w3id.org/dpv/risk/owl#ViolatingContractualObligation",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
- "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
+ "http://purl.org/dc/terms/contributor": [
{
- "@id": "https://w3id.org/dpv/risk/owl#"
+ "@value": "Harshvardhan J. Pandit"
}
],
- "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
+ "http://purl.org/dc/terms/created": [
{
- "@language": "en",
- "@value": "accepted"
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2022-08-17"
}
],
- "http://www.w3.org/2004/02/skos/core#definition": [
+ "http://purl.org/dc/terms/modified": [
{
- "@language": "en",
- "@value": "Risks and issues that affect or have the potential to affect specific individuals"
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2024-08-16"
}
],
- "http://www.w3.org/2004/02/skos/core#prefLabel": [
+ "http://purl.org/dc/terms/source": [
{
- "@language": "en",
- "@value": "Individual Risk"
+ "@id": "_:N638499f1a35f4f94abab8a1e6e4bf97d"
}
- ]
- },
- {
- "@id": "https://w3id.org/dpv/risk/owl#IntentionalMisuse",
- "@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
- "http://www.w3.org/2000/01/rdf-schema#Class",
- "http://www.w3.org/2002/07/owl#Class"
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
@@ -1785,44 +1784,66 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#UserRisks"
+ "@id": "https://w3id.org/dpv/risk/owl#LegalRisk"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
{
"@language": "en",
- "@value": "accepted"
+ "@value": "modified"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Intentional Misuse"
+ "@value": "Something that acts as or causes Violation of Contractual Obligations"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Intentional Misuse"
+ "@value": "Violation of Contractual Obligation"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#scopeNote": [
+ {
+ "@language": "en",
+ "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#RightsLimitation",
+ "@id": "_:N638499f1a35f4f94abab8a1e6e4bf97d",
+ "@type": [
+ "https://schema.org/WebPage"
+ ],
+ "https://schema.org/name": [
+ {
+ "@value": "ISO/IEC 27005:2018"
+ }
+ ],
+ "https://schema.org/url": [
+ {
+ "@value": "https://www.iso.org/standard/75281.html"
+ }
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#Harm",
"@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
"http://purl.org/dc/terms/contributor": [
{
- "@value": "Georg P. Krog, Harshvardhan J. Pandit"
+ "@value": "Harshvardhan J. Pandit"
}
],
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-18"
+ "@value": "2022-08-13"
}
],
"http://purl.org/dc/terms/modified": [
@@ -1838,7 +1859,7 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk"
+ "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -1850,24 +1871,24 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Limitation of Rights"
+ "@value": "Something that acts as or causes Harm to humans"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Limitation of Rights"
+ "@value": "Harm"
}
],
"http://www.w3.org/2004/02/skos/core#scopeNote": [
{
"@language": "en",
- "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0"
+ "@value": "This concept refers to the general abstract notion of harm"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#DataBreach",
+ "@id": "https://w3id.org/dpv/risk/owl#IllegalDataProcessing",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
@@ -1892,15 +1913,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N82834c9f1ecf4644ab2d9343a1169c62"
- }
- ],
- "http://purl.org/vocab/vann/example": [
- {
- "@id": "https://w3id.org/dpv/examples/owl#E0071"
- },
- {
- "@id": "https://w3id.org/dpv/examples/owl#E0069"
+ "@id": "_:Nfbea264abf694083a7d1db8b2101092b"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -1910,7 +1923,7 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach"
+ "@id": "https://w3id.org/dpv/risk/owl#LegalRisk"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -1922,18 +1935,24 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Data Breach"
+ "@value": "Something that acts as or causes Illegal Processing of Data"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Data Breach"
+ "@value": "Illegal Data Processing"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#scopeNote": [
+ {
+ "@language": "en",
+ "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0"
}
]
},
{
- "@id": "_:N82834c9f1ecf4644ab2d9343a1169c62",
+ "@id": "_:Nfbea264abf694083a7d1db8b2101092b",
"@type": [
"https://schema.org/WebPage"
],
@@ -1949,7 +1968,7 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#PublicOrderBreach",
+ "@id": "https://w3id.org/dpv/risk/owl#RightsViolation",
"@type": [
"https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -1957,13 +1976,13 @@
],
"http://purl.org/dc/terms/contributor": [
{
- "@value": "Harshvardhan J. Pandit"
+ "@value": "Georg P. Krog, Harshvardhan J. Pandit"
}
],
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
+ "@value": "2022-08-18"
}
],
"http://purl.org/dc/terms/modified": [
@@ -1972,11 +1991,6 @@
"@value": "2024-08-16"
}
],
- "http://purl.org/dc/terms/source": [
- {
- "@id": "_:N2bd2812bbacb46319d2bdb0e95e02f65"
- }
- ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk/owl#"
@@ -1984,7 +1998,7 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#LegalRisk"
+ "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -1996,60 +2010,72 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Public Order Breach"
+ "@value": "Something that acts as or causes Violation of Rights"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Public Order Breach"
+ "@value": "Violation of Rights"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#scopeNote": [
+ {
+ "@language": "en",
+ "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0"
}
]
},
{
- "@id": "_:N2bd2812bbacb46319d2bdb0e95e02f65",
+ "@id": "https://w3id.org/dpv/risk/owl#Discrimination",
"@type": [
- "https://schema.org/WebPage"
+ "https://w3id.org/dpv/owl#RiskConcept",
+ "http://www.w3.org/2000/01/rdf-schema#Class",
+ "http://www.w3.org/2002/07/owl#Class"
],
- "https://schema.org/name": [
+ "http://purl.org/dc/terms/contributor": [
{
- "@value": "ISO/IEC 27005:2018"
+ "@value": "Georg P. Krog"
}
],
- "https://schema.org/url": [
+ "http://purl.org/dc/terms/created": [
{
- "@value": "https://www.iso.org/standard/75281.html"
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2022-08-19"
}
- ]
- },
- {
- "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl",
- "@type": [
- "http://www.w3.org/ns/dx/prof/ResourceDescriptor"
],
- "http://purl.org/dc/terms/conformsTo": [
+ "http://purl.org/dc/terms/modified": [
{
- "@id": "https://www.w3.org/TR/turtle/"
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2024-08-16"
}
],
- "http://purl.org/dc/terms/format": [
+ "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
- "@id": "https://www.iana.org/assignments/media-types/text/turtle"
+ "@id": "https://w3id.org/dpv/risk/owl#"
}
],
- "http://purl.org/dc/terms/title": [
+ "http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@value": "Risk Concepts - Turtle serialiation"
+ "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk"
}
],
- "http://www.w3.org/ns/dx/prof/hasArtifact": [
+ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
{
- "@id": "https://w3id.org/dpv/risk/risk-owl.ttl"
+ "@language": "en",
+ "@value": "accepted"
}
],
- "http://www.w3.org/ns/dx/prof/hasRole": [
+ "http://www.w3.org/2004/02/skos/core#definition": [
{
- "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary"
+ "@language": "en",
+ "@value": "Something that acts as or causes Discrimination"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#prefLabel": [
+ {
+ "@language": "en",
+ "@value": "Discrimination"
}
]
},
@@ -2085,12 +2111,34 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#JudicialPenalty",
+ "@id": "https://w3id.org/dpv/risk/owl#LoseTrust",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
+ "http://purl.org/dc/terms/contributor": [
+ {
+ "@value": "Harshvardhan J. Pandit"
+ }
+ ],
+ "http://purl.org/dc/terms/created": [
+ {
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2022-08-17"
+ }
+ ],
+ "http://purl.org/dc/terms/modified": [
+ {
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2024-08-16"
+ }
+ ],
+ "http://purl.org/dc/terms/source": [
+ {
+ "@id": "_:N95b0eaaa71714fb48e2d00a428e03220"
+ }
+ ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk/owl#"
@@ -2098,7 +2146,7 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact"
+ "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -2110,23 +2158,61 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that involves or causes judicial penalties to be paid"
+ "@value": "Something that acts as or causes Loss of Trust"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Judicial Penalty"
+ "@value": "Lose of Trust"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#ComponentMalfunction",
+ "@id": "_:N95b0eaaa71714fb48e2d00a428e03220",
+ "@type": [
+ "https://schema.org/WebPage"
+ ],
+ "https://schema.org/name": [
+ {
+ "@value": "ISO/IEC 27005:2018"
+ }
+ ],
+ "https://schema.org/url": [
+ {
+ "@value": "https://www.iso.org/standard/75281.html"
+ }
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#IdentityTheft",
"@type": [
"https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
"http://www.w3.org/2002/07/owl#Class"
],
+ "http://purl.org/dc/terms/contributor": [
+ {
+ "@value": "Harshvardhan J. Pandit"
+ }
+ ],
+ "http://purl.org/dc/terms/created": [
+ {
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2022-08-17"
+ }
+ ],
+ "http://purl.org/dc/terms/modified": [
+ {
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2024-08-16"
+ }
+ ],
+ "http://purl.org/dc/terms/source": [
+ {
+ "@id": "_:N33b7660d50a4461e927089957dfd848b"
+ }
+ ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk/owl#"
@@ -2135,6 +2221,9 @@
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
"@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -2146,58 +2235,37 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Component Malfunction"
+ "@value": "Something that acts as or causes Identity Theft"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Component Malfunction"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#scopeNote": [
- {
- "@language": "en",
- "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of"
+ "@value": "Identity Theft"
}
]
},
{
- "@id": "https://w3id.org/dpv/guides",
+ "@id": "_:N33b7660d50a4461e927089957dfd848b",
"@type": [
- "http://www.w3.org/ns/dx/prof/ResourceDescriptor"
- ],
- "http://purl.org/dc/terms/conformsTo": [
- {
- "@id": "https://www.w3.org/TR/html/"
- }
- ],
- "http://purl.org/dc/terms/format": [
- {
- "@id": "https://www.iana.org/assignments/media-types/text/html"
- }
- ],
- "http://purl.org/dc/terms/title": [
- {
- "@value": "Guides for Data Privacy Vocabulary"
- }
+ "https://schema.org/WebPage"
],
- "http://www.w3.org/ns/dx/prof/hasArtifact": [
+ "https://schema.org/name": [
{
- "@id": "https://w3id.org/dpv/guides"
+ "@value": "ENISA Threat Taxonomy 2016"
}
],
- "http://www.w3.org/ns/dx/prof/hasRole": [
+ "https://schema.org/url": [
{
- "@id": "http://www.w3.org/ns/dx/prof/role/guidance"
+ "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#UnwantedDisclosureData",
+ "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedAccesstoPremises",
"@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
"http://purl.org/dc/terms/contributor": [
@@ -2219,7 +2287,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N12b2c9394da44250a5ab771adc23fab8"
+ "@id": "_:N7487c570f8f54358874e08fa38c8f27d"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -2228,8 +2296,17 @@
}
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept"
+ },
{
"@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -2241,18 +2318,18 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Unwanted Disclosure of Data"
+ "@value": "Something that acts as or causes Unauthorised Access to Premises"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Unwanted Disclosure of Data"
+ "@value": "Unauthorised Access to Premises"
}
]
},
{
- "@id": "_:N12b2c9394da44250a5ab771adc23fab8",
+ "@id": "_:N7487c570f8f54358874e08fa38c8f27d",
"@type": [
"https://schema.org/WebPage"
],
@@ -2268,10 +2345,10 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#ViolatingStatutoryObligations",
+ "@id": "https://w3id.org/dpv/risk/owl#UnwantedDisclosureData",
"@type": [
- "http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
+ "http://www.w3.org/2000/01/rdf-schema#Class",
"http://www.w3.org/2002/07/owl#Class"
],
"http://purl.org/dc/terms/contributor": [
@@ -2293,7 +2370,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:Nb5000792f7ae42ffb4c7efe3b93be7df"
+ "@id": "_:Nf14815c8a8694940bcdb35d12bf37b11"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -2303,36 +2380,33 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#LegalRisk"
+ "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
{
"@language": "en",
- "@value": "modified"
+ "@value": "accepted"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Violation of Statutory Obligations"
+ "@value": "Something that acts as or causes Unwanted Disclosure of Data"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Violation of Statutory Obligations"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#scopeNote": [
- {
- "@language": "en",
- "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0"
+ "@value": "Unwanted Disclosure of Data"
}
]
},
{
- "@id": "_:Nb5000792f7ae42ffb4c7efe3b93be7df",
+ "@id": "_:Nf14815c8a8694940bcdb35d12bf37b11",
"@type": [
"https://schema.org/WebPage"
],
@@ -2348,12 +2422,34 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#Privacy",
+ "@id": "https://w3id.org/dpv/risk/owl#LoseReputation",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
+ "http://purl.org/dc/terms/contributor": [
+ {
+ "@value": "Harshvardhan J. Pandit"
+ }
+ ],
+ "http://purl.org/dc/terms/created": [
+ {
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2022-08-17"
+ }
+ ],
+ "http://purl.org/dc/terms/modified": [
+ {
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2024-08-16"
+ }
+ ],
+ "http://purl.org/dc/terms/source": [
+ {
+ "@id": "_:N90d89ca8a8594ecabee31205aee25395"
+ }
+ ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk/owl#"
@@ -2361,7 +2457,7 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk"
+ "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -2370,44 +2466,65 @@
"@value": "accepted"
}
],
+ "http://www.w3.org/2004/02/skos/core#definition": [
+ {
+ "@language": "en",
+ "@value": "Something that acts as or causes Loss of Reputation"
+ }
+ ],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Privacy"
+ "@value": "Lose of Reputation"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#IntegrityBreach",
+ "@id": "_:N90d89ca8a8594ecabee31205aee25395",
"@type": [
- "http://www.w3.org/2000/01/rdf-schema#Class",
- "https://w3id.org/dpv/owl#RiskConcept",
- "http://www.w3.org/2002/07/owl#Class"
- ],
- "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
- {
- "@id": "https://w3id.org/dpv/risk/owl#"
- }
+ "https://schema.org/WebPage"
],
- "http://www.w3.org/2000/01/rdf-schema#subClassOf": [
+ "https://schema.org/name": [
{
- "@id": "https://w3id.org/dpv/risk/owl#DataBreach"
+ "@value": "ISO/IEC 27005:2018"
}
],
- "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
+ "https://schema.org/url": [
{
- "@language": "en",
- "@value": "accepted"
+ "@value": "https://www.iso.org/standard/75281.html"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact",
+ "@id": "https://w3id.org/dpv/risk/owl#Fee",
"@type": [
"https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
"http://www.w3.org/2002/07/owl#Class"
],
+ "http://purl.org/dc/terms/contributor": [
+ {
+ "@value": "Georg P. Krog, Harshvardhan J. Pandit"
+ }
+ ],
+ "http://purl.org/dc/terms/created": [
+ {
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2024-04-14"
+ }
+ ],
+ "http://purl.org/dc/terms/modified": [
+ {
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2024-08-16"
+ }
+ ],
+ "http://purl.org/dc/terms/source": [
+ {
+ "@language": "en",
+ "@value": "DGA 2.10"
+ }
+ ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk/owl#"
@@ -2415,30 +2532,30 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/owl#RiskConcept"
+ "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
{
"@language": "en",
- "@value": "accepted"
+ "@value": "modified"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Things that cause or have the potential to impact financial resources"
+ "@value": "Something that acts as or provides fees e.g. for using a service"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Financial Impact"
+ "@value": "Fee"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#Coercion",
+ "@id": "https://w3id.org/dpv/risk/owl#SystemIntrusion",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
@@ -2463,7 +2580,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N61513676426149faae9e58063eb667d8"
+ "@id": "_:Ne8bd9725515e46d0a941f4a4665a7868"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -2472,8 +2589,17 @@
}
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept"
+ },
{
"@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -2485,39 +2611,61 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Coercion"
+ "@value": "Something that acts as or causes System Intrusion"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Coercion"
+ "@value": "System Intrusion"
}
]
},
{
- "@id": "_:N61513676426149faae9e58063eb667d8",
+ "@id": "_:Ne8bd9725515e46d0a941f4a4665a7868",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ENISA Threat Taxonomy 2016"
+ "@value": "ENISA Reference Incident Classification Taxonomy 2018"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view"
+ "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#JudicialCosts",
+ "@id": "https://w3id.org/dpv/risk/owl#Extorsion",
"@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
+ "http://purl.org/dc/terms/contributor": [
+ {
+ "@value": "Harshvardhan J. Pandit"
+ }
+ ],
+ "http://purl.org/dc/terms/created": [
+ {
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2022-08-17"
+ }
+ ],
+ "http://purl.org/dc/terms/modified": [
+ {
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2024-08-16"
+ }
+ ],
+ "http://purl.org/dc/terms/source": [
+ {
+ "@id": "_:N78e6085a5a4a4a08adbcdb4af46722d9"
+ }
+ ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk/owl#"
@@ -2525,7 +2673,10 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact"
+ "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -2537,39 +2688,38 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that involves or causes judicial costs to be paid"
+ "@value": "Something that acts as or causes Extorsion"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Judicial Costs"
+ "@value": "Extorsion"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#Harm",
+ "@id": "_:N78e6085a5a4a4a08adbcdb4af46722d9",
"@type": [
- "http://www.w3.org/2000/01/rdf-schema#Class",
- "https://w3id.org/dpv/owl#RiskConcept",
- "http://www.w3.org/2002/07/owl#Class"
+ "https://schema.org/WebPage"
],
- "http://purl.org/dc/terms/contributor": [
+ "https://schema.org/name": [
{
- "@value": "Harshvardhan J. Pandit"
+ "@value": "ENISA Threat Taxonomy 2016"
}
],
- "http://purl.org/dc/terms/created": [
- {
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-13"
- }
- ],
- "http://purl.org/dc/terms/modified": [
+ "https://schema.org/url": [
{
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-08-16"
+ "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view"
}
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#IndividualHealthSafety",
+ "@type": [
+ "https://w3id.org/dpv/owl#RiskConcept",
+ "http://www.w3.org/2000/01/rdf-schema#Class",
+ "http://www.w3.org/2002/07/owl#Class"
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
@@ -2587,41 +2737,29 @@
"@value": "accepted"
}
],
- "http://www.w3.org/2004/02/skos/core#definition": [
- {
- "@language": "en",
- "@value": "Something that acts as or causes Harm to humans"
- }
- ],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Harm"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#scopeNote": [
- {
- "@language": "en",
- "@value": "This concept refers to the general abstract notion of harm"
+ "@value": "Individual Health & Safety"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#Renumeration",
+ "@id": "https://w3id.org/dpv/risk/owl#MalwareAttack",
"@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
"http://purl.org/dc/terms/contributor": [
{
- "@value": "Georg P. Krog, Harshvardhan J. Pandit"
+ "@value": "Harshvardhan J. Pandit"
}
],
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-04-14"
+ "@value": "2022-08-17"
}
],
"http://purl.org/dc/terms/modified": [
@@ -2630,6 +2768,11 @@
"@value": "2024-08-16"
}
],
+ "http://purl.org/dc/terms/source": [
+ {
+ "@id": "_:N6fb9cc1510c4401a9c582949b7a8c8b7"
+ }
+ ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk/owl#"
@@ -2637,7 +2780,16 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact"
+ "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -2649,39 +2801,38 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or provides renumeration which is in monetary or financial form"
+ "@value": "Something that acts as or causes Malware Attack"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Remuneration"
+ "@value": "Malware Attack"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#Detriment",
+ "@id": "_:N6fb9cc1510c4401a9c582949b7a8c8b7",
"@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
- "http://www.w3.org/2000/01/rdf-schema#Class",
- "http://www.w3.org/2002/07/owl#Class"
- ],
- "http://purl.org/dc/terms/contributor": [
- {
- "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves"
- }
+ "https://schema.org/WebPage"
],
- "http://purl.org/dc/terms/created": [
+ "https://schema.org/name": [
{
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-03-23"
+ "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments"
}
],
- "http://purl.org/dc/terms/modified": [
+ "https://schema.org/url": [
{
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-08-16"
+ "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment"
}
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack",
+ "@type": [
+ "http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
+ "http://www.w3.org/2002/07/owl#Class"
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
@@ -2690,7 +2841,16 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#LegalRisk"
+ "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -2702,21 +2862,21 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Detriment"
+ "@value": "Something that acts as or causes an attack on security with the aim of undermining it"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Detriment"
+ "@value": "Security Attack"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity",
+ "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk",
"@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -2726,7 +2886,7 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
+ "@id": "https://w3id.org/dpv/owl#RiskConcept"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -2738,18 +2898,18 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Unauthorised Activity"
+ "@value": "Risks and issues that affect the reputation of the organisation"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Unauthorised Activity"
+ "@value": "Reputational Risk"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#SystemIntrusion",
+ "@id": "https://w3id.org/dpv/risk/owl#SocialDisadvantage",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
@@ -2757,13 +2917,13 @@
],
"http://purl.org/dc/terms/contributor": [
{
- "@value": "Harshvardhan J. Pandit"
+ "@value": "Georg P. Krog"
}
],
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
+ "@value": "2022-08-19"
}
],
"http://purl.org/dc/terms/modified": [
@@ -2772,11 +2932,6 @@
"@value": "2024-08-16"
}
],
- "http://purl.org/dc/terms/source": [
- {
- "@id": "_:N7a5848cbabb14c8ea2d162432eba32f0"
- }
- ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk/owl#"
@@ -2784,7 +2939,7 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
+ "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -2796,37 +2951,52 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes System Intrusion"
+ "@value": "Something that acts as or causes Social Disadvantage"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "System Intrusion"
+ "@value": "Social Disadvantage"
}
]
},
{
- "@id": "_:N7a5848cbabb14c8ea2d162432eba32f0",
+ "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf",
"@type": [
- "https://schema.org/WebPage"
+ "http://www.w3.org/ns/dx/prof/ResourceDescriptor"
],
- "https://schema.org/name": [
+ "http://purl.org/dc/terms/conformsTo": [
{
- "@value": "ENISA Reference Incident Classification Taxonomy 2018"
+ "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#"
}
],
- "https://schema.org/url": [
+ "http://purl.org/dc/terms/format": [
{
- "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
+ "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml"
+ }
+ ],
+ "http://purl.org/dc/terms/title": [
+ {
+ "@value": "Risk Concepts - RDF/XML serialiation"
+ }
+ ],
+ "http://www.w3.org/ns/dx/prof/hasArtifact": [
+ {
+ "@id": "https://w3id.org/dpv/risk/risk-owl.rdf"
+ }
+ ],
+ "http://www.w3.org/ns/dx/prof/hasRole": [
+ {
+ "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach",
+ "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedInformationDisclosure",
"@type": [
- "http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
+ "http://www.w3.org/2000/01/rdf-schema#Class",
"http://www.w3.org/2002/07/owl#Class"
],
"http://purl.org/dc/terms/contributor": [
@@ -2848,7 +3018,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:Nee086e9da9f643e2837c115c27f1cabc"
+ "@id": "_:N89971235b5e34930a94f46c696e0ac94"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -2858,7 +3028,10 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk"
+ "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -2870,34 +3043,34 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Security Breach"
+ "@value": "Something that acts as or causes Unauthorised Information Disclosure"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Security Breach"
+ "@value": "Unauthorised Information Disclosure"
}
]
},
{
- "@id": "_:Nee086e9da9f643e2837c115c27f1cabc",
+ "@id": "_:N89971235b5e34930a94f46c696e0ac94",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ISO/IEC 27005:2018"
+ "@value": "ENISA Reference Incident Classification Taxonomy 2018"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.iso.org/standard/75281.html"
+ "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#MalwareAttack",
+ "@id": "https://w3id.org/dpv/risk/owl#Reidentification",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
@@ -2911,7 +3084,7 @@
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
+ "@value": "2022-08-19"
}
],
"http://purl.org/dc/terms/modified": [
@@ -2920,11 +3093,6 @@
"@value": "2024-08-16"
}
],
- "http://purl.org/dc/terms/source": [
- {
- "@id": "_:N933b42794d4f41a39ee17bc9b20bf774"
- }
- ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk/owl#"
@@ -2932,7 +3100,10 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
+ "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -2944,48 +3115,38 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Malware Attack"
+ "@value": "Something that acts as or causes Re-identification"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Malware Attack"
- }
- ]
- },
- {
- "@id": "_:N933b42794d4f41a39ee17bc9b20bf774",
- "@type": [
- "https://schema.org/WebPage"
- ],
- "https://schema.org/name": [
- {
- "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments"
+ "@value": "Re-identification"
}
],
- "https://schema.org/url": [
+ "http://www.w3.org/2004/02/skos/core#scopeNote": [
{
- "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment"
+ "@language": "en",
+ "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedReidentification",
+ "@id": "https://w3id.org/dpv/risk/owl#RightsImpact",
"@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
"http://purl.org/dc/terms/contributor": [
{
- "@value": "Georg P. Krog"
+ "@value": "Harshvardhan J. Pandit"
}
],
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-19"
+ "@value": "2022-08-17"
}
],
"http://purl.org/dc/terms/modified": [
@@ -2994,6 +3155,11 @@
"@value": "2024-08-16"
}
],
+ "http://purl.org/dc/terms/source": [
+ {
+ "@id": "_:N7b552ef83c274f84b167cc68c23676bb"
+ }
+ ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk/owl#"
@@ -3001,7 +3167,10 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
+ "@id": "https://w3id.org/dpv/owl#Impact"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -3013,18 +3182,40 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Unauthorised Re-Identification"
+ "@value": "Something that acts as or causes Impact to Rights"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Unauthorised Re-Identification"
+ "@value": "Impact to Rights"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#scopeNote": [
+ {
+ "@language": "en",
+ "@value": "This concept was called \"ImpactToRights\" in DPV 2.0"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#CopyrightViolation",
+ "@id": "_:N7b552ef83c274f84b167cc68c23676bb",
+ "@type": [
+ "https://schema.org/WebPage"
+ ],
+ "https://schema.org/name": [
+ {
+ "@value": "ISO/IEC 27005:2018"
+ }
+ ],
+ "https://schema.org/url": [
+ {
+ "@value": "https://www.iso.org/standard/75281.html"
+ }
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataDisclosure",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
@@ -3049,7 +3240,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N73922ea12cd34584b91e209f306167ae"
+ "@id": "_:N7c66233cabb64c2486ae612a1ff6b01d"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -3059,7 +3250,10 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#LegalRisk"
+ "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -3071,37 +3265,37 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Copyright Violation"
+ "@value": "Something that acts as or causes Unauthorised Data Disclosure"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Copyright Violation"
+ "@value": "Unauthorised Data Disclosure"
}
]
},
{
- "@id": "_:N73922ea12cd34584b91e209f306167ae",
+ "@id": "_:N7c66233cabb64c2486ae612a1ff6b01d",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ENISA Reference Incident Classification Taxonomy 2018"
+ "@value": "ISO/IEC 27005:2018"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
+ "@value": "https://www.iso.org/standard/75281.html"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemModification",
+ "@id": "https://w3id.org/dpv/risk/owl#HumanErrors",
"@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
"http://purl.org/dc/terms/contributor": [
@@ -3123,7 +3317,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N0c47798cd08a44d790a99ee3c58dcfb9"
+ "@id": "_:Na882c52257364f5896e5b38b50bb08fe"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -3133,7 +3327,7 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
+ "@id": "https://w3id.org/dpv/risk/owl#UserRisks"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -3145,34 +3339,34 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Unauthorised System Modification"
+ "@value": "Something that acts as or causes Human Errors"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Unauthorised System Modification"
+ "@value": "Human Errors"
}
]
},
{
- "@id": "_:N0c47798cd08a44d790a99ee3c58dcfb9",
+ "@id": "_:Na882c52257364f5896e5b38b50bb08fe",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments"
+ "@value": "ENISA Reference Incident Classification Taxonomy 2018"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment"
+ "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#MaliciousCodeAttack",
+ "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
@@ -3197,7 +3391,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N7beef942706b41468112e467b91c5f39"
+ "@id": "_:Nb3034bc7cf1e485b85582c21529ebaa4"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -3207,7 +3401,16 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
+ "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -3219,34 +3422,34 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Malicious Code Attack"
+ "@value": "Something that acts as or causes Security Breach"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Malicious Code Attack"
+ "@value": "Security Breach"
}
]
},
{
- "@id": "_:N7beef942706b41468112e467b91c5f39",
+ "@id": "_:Nb3034bc7cf1e485b85582c21529ebaa4",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ENISA Reference Incident Classification Taxonomy 2018"
+ "@value": "ISO/IEC 27005:2018"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
+ "@value": "https://www.iso.org/standard/75281.html"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#Fraud",
+ "@id": "https://w3id.org/dpv/risk/owl#SystemMalfunction",
"@type": [
"https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -3271,7 +3474,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:Nd4dde0f0f01e4d739b22630aa8ad7d7a"
+ "@id": "_:N18aeaa08367a4c56822793249e34feae"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -3281,7 +3484,10 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
+ "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -3293,18 +3499,24 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Fraud"
+ "@value": "Something that acts as or causes System Malfunction"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Fraud"
+ "@value": "System Malfunction"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#scopeNote": [
+ {
+ "@language": "en",
+ "@value": "Here system refers to both hardware and software systems"
}
]
},
{
- "@id": "_:Nd4dde0f0f01e4d739b22630aa8ad7d7a",
+ "@id": "_:N18aeaa08367a4c56822793249e34feae",
"@type": [
"https://schema.org/WebPage"
],
@@ -3320,10 +3532,10 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#Cryptojacking",
+ "@id": "https://w3id.org/dpv/risk/owl#AuthorisationFailure",
"@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
"http://purl.org/dc/terms/contributor": [
@@ -3345,7 +3557,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:Neb960f38438d48258bee0ebae96be48e"
+ "@id": "_:N588812d3250243469d4d5b0cbd82dc9e"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -3355,7 +3567,13 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
+ "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -3367,37 +3585,37 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Cryptojacking"
+ "@value": "Something that acts as or causes Authorisation Failure"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Cryptojacking"
+ "@value": "Authorisation Failure"
}
]
},
{
- "@id": "_:Neb960f38438d48258bee0ebae96be48e",
+ "@id": "_:N588812d3250243469d4d5b0cbd82dc9e",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ENISA Threat Landscape 2021"
+ "@value": "ENISa Trust Services Security Incidents 2021"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021"
+ "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataDisclosure",
+ "@id": "https://w3id.org/dpv/risk/owl#ViolatingCodeOfConduct",
"@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
"http://purl.org/dc/terms/contributor": [
@@ -3419,7 +3637,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:Nf415d60c8c8849ba95e5611d481b06ce"
+ "@id": "_:Nb240be91051241df8fe71581eedea8cc"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -3429,30 +3647,36 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
+ "@id": "https://w3id.org/dpv/risk/owl#LegalRisk"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
{
"@language": "en",
- "@value": "accepted"
+ "@value": "modified"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Unauthorised Data Disclosure"
+ "@value": "Something that acts as or causes Violation of Code of Conduct"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Unauthorised Data Disclosure"
+ "@value": "Violating Code of Conduct"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#scopeNote": [
+ {
+ "@language": "en",
+ "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0"
}
]
},
{
- "@id": "_:Nf415d60c8c8849ba95e5611d481b06ce",
+ "@id": "_:Nb240be91051241df8fe71581eedea8cc",
"@type": [
"https://schema.org/WebPage"
],
@@ -3468,7 +3692,7 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#AuthorisationFailure",
+ "@id": "https://w3id.org/dpv/risk/owl#Renumeration",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
@@ -3476,13 +3700,13 @@
],
"http://purl.org/dc/terms/contributor": [
{
- "@value": "Harshvardhan J. Pandit"
+ "@value": "Georg P. Krog, Harshvardhan J. Pandit"
}
],
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
+ "@value": "2024-04-14"
}
],
"http://purl.org/dc/terms/modified": [
@@ -3491,11 +3715,6 @@
"@value": "2024-08-16"
}
],
- "http://purl.org/dc/terms/source": [
- {
- "@id": "_:N8906a1d2a7bd4484854e88a2dc1b93a5"
- }
- ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk/owl#"
@@ -3503,7 +3722,7 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk"
+ "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -3515,34 +3734,18 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Authorisation Failure"
+ "@value": "Something that acts as or provides renumeration which is in monetary or financial form"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Authorisation Failure"
- }
- ]
- },
- {
- "@id": "_:N8906a1d2a7bd4484854e88a2dc1b93a5",
- "@type": [
- "https://schema.org/WebPage"
- ],
- "https://schema.org/name": [
- {
- "@value": "ENISa Trust Services Security Incidents 2021"
- }
- ],
- "https://schema.org/url": [
- {
- "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021"
+ "@value": "Remuneration"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#Scam",
+ "@id": "https://w3id.org/dpv/risk/owl#FinancialLoss",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
@@ -3567,7 +3770,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N498890541a5449e290f0aea406ea5090"
+ "@id": "_:N698d6b9272804e2dba685b14f6e69152"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -3577,7 +3780,7 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
+ "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -3589,18 +3792,18 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Scam"
+ "@value": "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Scam"
+ "@value": "Financial Loss"
}
]
},
{
- "@id": "_:N498890541a5449e290f0aea406ea5090",
+ "@id": "_:N698d6b9272804e2dba685b14f6e69152",
"@type": [
"https://schema.org/WebPage"
],
@@ -3616,10 +3819,10 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#Extorsion",
+ "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedResourceUse",
"@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
"http://purl.org/dc/terms/contributor": [
@@ -3641,7 +3844,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N40f94dff19814aa6ae7d3074eb3409d8"
+ "@id": "_:N605e2cac18a74200ab14cc33e319b6cb"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -3652,6 +3855,9 @@
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
"@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -3663,60 +3869,99 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Extorsion"
+ "@value": "Something that acts as or causes Unauthorised Resource Use"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Extorsion"
+ "@value": "Unauthorised Resource Use"
}
]
},
{
- "@id": "_:N40f94dff19814aa6ae7d3074eb3409d8",
+ "@id": "_:N605e2cac18a74200ab14cc33e319b6cb",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ENISA Threat Taxonomy 2016"
+ "@value": "ISO/IEC 27005:2018"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view"
+ "@value": "https://www.iso.org/standard/75281.html"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#PhysicalAssault",
+ "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl",
+ "@type": [
+ "http://www.w3.org/ns/dx/prof/ResourceDescriptor"
+ ],
+ "http://purl.org/dc/terms/conformsTo": [
+ {
+ "@id": "https://www.w3.org/TR/turtle/"
+ }
+ ],
+ "http://purl.org/dc/terms/format": [
+ {
+ "@id": "https://www.iana.org/assignments/media-types/text/turtle"
+ }
+ ],
+ "http://purl.org/dc/terms/title": [
+ {
+ "@value": "Risk Concepts - Turtle serialiation"
+ }
+ ],
+ "http://www.w3.org/ns/dx/prof/hasArtifact": [
+ {
+ "@id": "https://w3id.org/dpv/risk/risk-owl.ttl"
+ }
+ ],
+ "http://www.w3.org/ns/dx/prof/hasRole": [
+ {
+ "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary"
+ }
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#SocietalHealthSafety",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
- "http://purl.org/dc/terms/contributor": [
+ "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
- "@value": "Harshvardhan J. Pandit"
+ "@id": "https://w3id.org/dpv/risk/owl#"
}
],
- "http://purl.org/dc/terms/created": [
+ "http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
+ "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk"
}
],
- "http://purl.org/dc/terms/modified": [
+ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
{
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-08-16"
+ "@language": "en",
+ "@value": "accepted"
}
],
- "http://purl.org/dc/terms/source": [
+ "http://www.w3.org/2004/02/skos/core#prefLabel": [
{
- "@id": "_:N4414613afa8c4456b9a9b6c3f17a7a0c"
+ "@language": "en",
+ "@value": "Societal Health & Safety"
}
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#AccidentalMisuse",
+ "@type": [
+ "http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
+ "http://www.w3.org/2002/07/owl#Class"
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
@@ -3725,7 +3970,7 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk"
+ "@id": "https://w3id.org/dpv/risk/owl#UserRisks"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -3737,37 +3982,57 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Physical Assault"
+ "@value": "Accidental Misuse"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Physical Assault"
+ "@value": "Accidental Misuse"
}
]
},
{
- "@id": "_:N4414613afa8c4456b9a9b6c3f17a7a0c",
+ "@id": "https://w3id.org/dpv/risk/owl#JudicialCosts",
"@type": [
- "https://schema.org/WebPage"
+ "https://w3id.org/dpv/owl#RiskConcept",
+ "http://www.w3.org/2000/01/rdf-schema#Class",
+ "http://www.w3.org/2002/07/owl#Class"
],
- "https://schema.org/name": [
+ "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
- "@value": "ISO/IEC 27005:2018"
+ "@id": "https://w3id.org/dpv/risk/owl#"
}
],
- "https://schema.org/url": [
+ "http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@value": "https://www.iso.org/standard/75281.html"
+ "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact"
+ }
+ ],
+ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
+ {
+ "@language": "en",
+ "@value": "accepted"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#definition": [
+ {
+ "@language": "en",
+ "@value": "Something that involves or causes judicial costs to be paid"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#prefLabel": [
+ {
+ "@language": "en",
+ "@value": "Judicial Costs"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#HumanErrors",
+ "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccount",
"@type": [
- "http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
+ "http://www.w3.org/2000/01/rdf-schema#Class",
"http://www.w3.org/2002/07/owl#Class"
],
"http://purl.org/dc/terms/contributor": [
@@ -3789,7 +4054,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N7d9296887d1d4b6ea986d2ad6579a1ec"
+ "@id": "_:N252928e4ed0f4c6ea83876f7fb2c3d78"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -3799,7 +4064,16 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#UserRisks"
+ "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -3811,18 +4085,18 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Human Errors"
+ "@value": "Something that acts as or causes a compromised account that is then used by the compromiser"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Human Errors"
+ "@value": "Compromise Account"
}
]
},
{
- "@id": "_:N7d9296887d1d4b6ea986d2ad6579a1ec",
+ "@id": "_:N252928e4ed0f4c6ea83876f7fb2c3d78",
"@type": [
"https://schema.org/WebPage"
],
@@ -3838,42 +4112,20 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#IllegalDataProcessing",
+ "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact",
"@type": [
- "http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
+ "http://www.w3.org/2000/01/rdf-schema#Class",
"http://www.w3.org/2002/07/owl#Class"
],
- "http://purl.org/dc/terms/contributor": [
+ "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
- "@value": "Harshvardhan J. Pandit"
+ "@id": "https://w3id.org/dpv/risk/owl#"
}
],
- "http://purl.org/dc/terms/created": [
+ "http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
- }
- ],
- "http://purl.org/dc/terms/modified": [
- {
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-08-16"
- }
- ],
- "http://purl.org/dc/terms/source": [
- {
- "@id": "_:N83bd5296b4d94804a73f0e0518c39495"
- }
- ],
- "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
- {
- "@id": "https://w3id.org/dpv/risk/owl#"
- }
- ],
- "http://www.w3.org/2000/01/rdf-schema#subClassOf": [
- {
- "@id": "https://w3id.org/dpv/risk/owl#LegalRisk"
+ "@id": "https://w3id.org/dpv/owl#RiskConcept"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -3885,150 +4137,80 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Illegal Processing of Data"
+ "@value": "Things that cause or have the potential to impact financial resources"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Illegal Data Processing"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#scopeNote": [
- {
- "@language": "en",
- "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0"
- }
- ]
- },
- {
- "@id": "_:N83bd5296b4d94804a73f0e0518c39495",
- "@type": [
- "https://schema.org/WebPage"
- ],
- "https://schema.org/name": [
- {
- "@value": "ISO/IEC 27005:2018"
- }
- ],
- "https://schema.org/url": [
- {
- "@value": "https://www.iso.org/standard/75281.html"
+ "@value": "Financial Impact"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#UserRisks",
+ "@id": "https://w3id.org/dpv/guides",
"@type": [
- "http://www.w3.org/2000/01/rdf-schema#Class",
- "https://w3id.org/dpv/owl#RiskConcept",
- "http://www.w3.org/2002/07/owl#Class"
+ "http://www.w3.org/ns/dx/prof/ResourceDescriptor"
],
- "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
+ "http://purl.org/dc/terms/conformsTo": [
{
- "@id": "https://w3id.org/dpv/risk/owl#"
+ "@id": "https://www.w3.org/TR/html/"
}
],
- "http://www.w3.org/2000/01/rdf-schema#subClassOf": [
+ "http://purl.org/dc/terms/format": [
{
- "@id": "https://w3id.org/dpv/owl#RiskConcept"
+ "@id": "https://www.iana.org/assignments/media-types/text/html"
}
],
- "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
+ "http://purl.org/dc/terms/title": [
{
- "@language": "en",
- "@value": "accepted"
+ "@value": "Guides for Data Privacy Vocabulary"
}
],
- "http://www.w3.org/2004/02/skos/core#definition": [
+ "http://www.w3.org/ns/dx/prof/hasArtifact": [
{
- "@language": "en",
- "@value": "Concepts associated with risks that arise due to User or Human use"
+ "@id": "https://w3id.org/dpv/guides"
}
],
- "http://www.w3.org/2004/02/skos/core#prefLabel": [
+ "http://www.w3.org/ns/dx/prof/hasRole": [
{
- "@language": "en",
- "@value": "User Risks"
+ "@id": "http://www.w3.org/ns/dx/prof/role/guidance"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#PsychologicalHarm",
+ "@id": "https://w3id.org/dpv/primer",
"@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
- "http://www.w3.org/2000/01/rdf-schema#Class",
- "http://www.w3.org/2002/07/owl#Class"
- ],
- "http://purl.org/dc/terms/contributor": [
- {
- "@value": "Harshvardhan J. Pandit"
- }
- ],
- "http://purl.org/dc/terms/created": [
- {
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
- }
- ],
- "http://purl.org/dc/terms/modified": [
- {
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-08-16"
- }
- ],
- "http://purl.org/dc/terms/source": [
- {
- "@id": "_:N903ec696d7504183af4ba63f3f295e8e"
- }
- ],
- "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
- {
- "@id": "https://w3id.org/dpv/risk/owl#"
- }
- ],
- "http://www.w3.org/2000/01/rdf-schema#subClassOf": [
- {
- "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk"
- }
+ "http://www.w3.org/ns/dx/prof/ResourceDescriptor"
],
- "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
+ "http://purl.org/dc/terms/conformsTo": [
{
- "@language": "en",
- "@value": "accepted"
+ "@id": "https://www.w3.org/TR/html/"
}
],
- "http://www.w3.org/2004/02/skos/core#definition": [
+ "http://purl.org/dc/terms/format": [
{
- "@language": "en",
- "@value": "Something that acts as or causes Psychological Harm"
+ "@id": "https://www.iana.org/assignments/media-types/text/html"
}
],
- "http://www.w3.org/2004/02/skos/core#prefLabel": [
+ "http://purl.org/dc/terms/title": [
{
- "@language": "en",
- "@value": "Psychological Harm"
+ "@value": "Primer for Data Privacy Vocabulary"
}
- ]
- },
- {
- "@id": "_:N903ec696d7504183af4ba63f3f295e8e",
- "@type": [
- "https://schema.org/WebPage"
],
- "https://schema.org/name": [
+ "http://www.w3.org/ns/dx/prof/hasArtifact": [
{
- "@value": "ENISA Reference Incident Classification Taxonomy 2018"
+ "@id": "https://w3id.org/dpv/primer"
}
],
- "https://schema.org/url": [
+ "http://www.w3.org/ns/dx/prof/hasRole": [
{
- "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
+ "@id": "http://www.w3.org/ns/dx/prof/role/guidance"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccount",
+ "@id": "https://w3id.org/dpv/risk/owl#Blackmail",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
@@ -4053,7 +4235,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N2ad682e6dc844471903bc2f55f3eaae7"
+ "@id": "_:N72e00e4999f548eb88bf909311860524"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -4063,7 +4245,10 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk"
+ "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -4075,34 +4260,34 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes a compromised account that is then used by the compromiser"
+ "@value": "Something that acts as or causes Blackmail"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Compromise Account"
+ "@value": "Blackmail"
}
]
},
{
- "@id": "_:N2ad682e6dc844471903bc2f55f3eaae7",
+ "@id": "_:N72e00e4999f548eb88bf909311860524",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ENISA Reference Incident Classification Taxonomy 2018"
+ "@value": "ISO/IEC 27005:2018"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
+ "@value": "https://www.iso.org/standard/75281.html"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#Payment",
+ "@id": "https://w3id.org/dpv/risk/owl#Benefit",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
@@ -4110,13 +4295,13 @@
],
"http://purl.org/dc/terms/contributor": [
{
- "@value": "Georg P. Krog, Harshvardhan J. Pandit"
+ "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres"
}
],
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-04-14"
+ "@value": "2022-03-23"
}
],
"http://purl.org/dc/terms/modified": [
@@ -4144,49 +4329,18 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources"
+ "@value": "Something that acts as or causes benefits"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Payment"
- }
- ]
- },
- {
- "@id": "https://w3id.org/dpv/primer",
- "@type": [
- "http://www.w3.org/ns/dx/prof/ResourceDescriptor"
- ],
- "http://purl.org/dc/terms/conformsTo": [
- {
- "@id": "https://www.w3.org/TR/html/"
- }
- ],
- "http://purl.org/dc/terms/format": [
- {
- "@id": "https://www.iana.org/assignments/media-types/text/html"
- }
- ],
- "http://purl.org/dc/terms/title": [
- {
- "@value": "Primer for Data Privacy Vocabulary"
- }
- ],
- "http://www.w3.org/ns/dx/prof/hasArtifact": [
- {
- "@id": "https://w3id.org/dpv/primer"
- }
- ],
- "http://www.w3.org/ns/dx/prof/hasRole": [
- {
- "@id": "http://www.w3.org/ns/dx/prof/role/guidance"
+ "@value": "Benefit"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccountCredentials",
+ "@id": "https://w3id.org/dpv/risk/owl#DenialServiceAttack",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
@@ -4211,7 +4365,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:Nf877665a169e4a7eac29964fc15db245"
+ "@id": "_:N8705162a41ca472c9e3867ec5902de25"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -4221,7 +4375,10 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk"
+ "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -4233,56 +4390,39 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Account Credentials to be compromised"
+ "@value": "Something that acts as or causes Denial of Service Attack (DoS)"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Compromise Account Credentials"
+ "@value": "Denial of Service Attack (DoS)"
}
]
},
{
- "@id": "_:Nf877665a169e4a7eac29964fc15db245",
+ "@id": "_:N8705162a41ca472c9e3867ec5902de25",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ENISA Reference Incident Classification Taxonomy 2018"
+ "@value": "ISO/IEC 27005:2018"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
+ "@value": "https://www.iso.org/standard/75281.html"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#Damage",
+ "@id": "https://w3id.org/dpv/risk/owl#ComponentFailure",
"@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
- "http://purl.org/dc/terms/contributor": [
- {
- "@value": "Harshvardhan J. Pandit"
- }
- ],
- "http://purl.org/dc/terms/created": [
- {
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-03-30"
- }
- ],
- "http://purl.org/dc/terms/modified": [
- {
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-08-16"
- }
- ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk/owl#"
@@ -4290,7 +4430,10 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#LegalRisk"
+ "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -4302,13 +4445,19 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Damage"
+ "@value": "Something that acts as or causes Component Failure"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Damage"
+ "@value": "Component Failure"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#scopeNote": [
+ {
+ "@language": "en",
+ "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of"
}
]
},
@@ -4349,243 +4498,95 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#",
+ "@id": "https://w3id.org/dpv/risk/owl#EquipmentFailure",
"@type": [
- "http://www.w3.org/ns/dx/prof/Profile",
- "http://www.w3.org/2002/07/owl#Ontology"
+ "http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
+ "http://www.w3.org/2002/07/owl#Class"
],
- "http://purl.org/dc/terms/bibliographicCitation": [
- {
- "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426"
- }
- ],
- "http://purl.org/dc/terms/conformsTo": [
- {
- "@value": "http://www.w3.org/2004/02/skos/core"
- },
- {
- "@id": "http://www.w3.org/2002/07/owl"
- },
- {
- "@value": "http://www.w3.org/2000/01/rdf-schema"
- }
- ],
- "http://purl.org/dc/terms/contributor": [
- {
- "@value": "Axel Polleres"
- },
- {
- "@value": "Julian Flake"
- },
- {
- "@value": "Fajar Ekaputra"
- },
- {
- "@value": "Beatriz Esteves"
- },
- {
- "@value": "Delaram Golpayegani"
- },
- {
- "@value": "Georg P. Krog"
- },
+ "http://purl.org/dc/terms/contributor": [
{
"@value": "Harshvardhan J. Pandit"
}
],
"http://purl.org/dc/terms/created": [
{
- "@language": "en",
- "@value": "2022-08-14"
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2022-08-17"
}
],
- "http://purl.org/dc/terms/creator": [
- {
- "@language": "en",
- "@value": "Delaram Golpayegani"
- },
- {
- "@language": "en",
- "@value": "Beatriz Esteves"
- },
- {
- "@language": "en",
- "@value": "Julian Flake"
- },
- {
- "@language": "en",
- "@value": "Rob Brennan"
- },
- {
- "@language": "en",
- "@value": "Harshvardhan J. Pandit"
- },
- {
- "@language": "en",
- "@value": "Paul Ryan"
- },
+ "http://purl.org/dc/terms/modified": [
{
- "@language": "en",
- "@value": "Georg P. Krog"
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2024-08-16"
}
],
- "http://purl.org/dc/terms/description": [
+ "http://purl.org/dc/terms/source": [
{
- "@language": "en",
- "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management"
+ "@id": "_:N8e86fbf714a04b25a51dfcacec1cb10e"
}
],
- "http://purl.org/dc/terms/hasVersion": [
+ "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk/owl#"
}
],
- "http://purl.org/dc/terms/identifier": [
- {
- "@value": "https://w3id.org/dpv/risk"
- }
- ],
- "http://purl.org/dc/terms/issued": [
+ "http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@language": "en",
- "@value": "2022-08-14"
- }
- ],
- "http://purl.org/dc/terms/license": [
+ "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk"
+ },
{
- "@id": "https://www.w3.org/copyright/document-license-2023/"
+ "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept"
}
],
- "http://purl.org/dc/terms/modified": [
+ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
{
"@language": "en",
- "@value": "2024-07-13"
- }
- ],
- "http://purl.org/dc/terms/publisher": [
- {
- "@id": "https://www.w3.org/"
- }
- ],
- "http://purl.org/dc/terms/source": [
- {
- "@id": "https://www.w3.org/groups/cg/dpvcg/"
+ "@value": "accepted"
}
],
- "http://purl.org/dc/terms/title": [
+ "http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Risk Concepts"
- }
- ],
- "http://purl.org/ontology/bibo/doi": [
- {
- "@value": "10.5281/zenodo.12505841"
- }
- ],
- "http://purl.org/ontology/bibo/status": [
- {
- "@value": "http://purl.org/ontology/bibo/status/published"
- }
- ],
- "http://purl.org/vocab/vann/preferredNamespacePrefix": [
- {
- "@value": "risk"
- }
- ],
- "http://purl.org/vocab/vann/preferredNamespaceUri": [
- {
- "@value": "https://w3id.org/dpv/risk#"
+ "@value": "Something that acts as or causes Equipment Failure"
}
],
- "http://www.w3.org/2000/01/rdf-schema#Label": [
+ "http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "RISK"
- }
- ],
- "http://www.w3.org/2002/07/owl#versionIRI": [
- {
- "@id": "https://w3id.org/dpv/2.1-dev/risk/owl#"
- }
- ],
- "http://www.w3.org/2002/07/owl#versionInfo": [
- {
- "@value": "2.1-dev"
- }
- ],
- "http://www.w3.org/ns/dx/prof/hasResource": [
- {
- "@id": "https://w3id.org/dpv/guides"
- },
- {
- "@id": "https://w3id.org/dpv/risk/owl#serialisation-html"
- },
- {
- "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3"
- },
- {
- "@id": "https://w3id.org/dpv/examples"
- },
- {
- "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld"
- },
- {
- "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl"
- },
- {
- "@id": "https://w3id.org/dpv/primer"
- },
- {
- "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf"
+ "@value": "Equipment Failure"
}
],
- "http://www.w3.org/ns/dx/prof/isProfileOf": [
- {
- "@id": "http://www.w3.org/2002/07/owl"
- },
- {
- "@id": "https://w3id.org/dpv/owl"
- },
+ "http://www.w3.org/2004/02/skos/core#scopeNote": [
{
- "@id": "https://w3id.org/dpv/risk/owl#"
+ "@language": "en",
+ "@value": "Here equipment refers to physical equipment"
}
+ ]
+ },
+ {
+ "@id": "_:N8e86fbf714a04b25a51dfcacec1cb10e",
+ "@type": [
+ "https://schema.org/WebPage"
],
- "http://xmlns.com/foaf/0.1/logo": [
+ "https://schema.org/name": [
{
- "@id": "https://w3id.org/dpv/media/logo.png"
+ "@value": "ISO/IEC 27005:2018"
}
],
- "https://schema.org/version": [
+ "https://schema.org/url": [
{
- "@value": "2.1-dev"
+ "@value": "https://www.iso.org/standard/75281.html"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#Compensation",
+ "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
- "http://purl.org/dc/terms/contributor": [
- {
- "@value": "Georg P. Krog, Harshvardhan J. Pandit"
- }
- ],
- "http://purl.org/dc/terms/created": [
- {
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-04-14"
- }
- ],
- "http://purl.org/dc/terms/modified": [
- {
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-08-16"
- }
- ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk/owl#"
@@ -4593,7 +4594,7 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact"
+ "@id": "https://w3id.org/dpv/owl#RiskConcept"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -4605,127 +4606,39 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms"
+ "@value": "Risks and issues that arise during operational processes"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Compensation"
- }
- ]
- },
- {
- "@id": "https://w3id.org/dpv/risk/owl#serialisation-html",
- "@type": [
- "http://www.w3.org/ns/dx/prof/ResourceDescriptor"
- ],
- "http://purl.org/dc/terms/conformsTo": [
- {
- "@id": "https://www.w3.org/TR/html/"
- }
- ],
- "http://purl.org/dc/terms/format": [
- {
- "@id": "https://www.iana.org/assignments/media-types/text/html"
- }
- ],
- "http://purl.org/dc/terms/title": [
- {
- "@value": "Risk Concepts - HTML serialiation"
- }
- ],
- "http://www.w3.org/ns/dx/prof/hasArtifact": [
- {
- "@id": "https://w3id.org/dpv/risk/risk-owl.html"
- }
- ],
- "http://www.w3.org/ns/dx/prof/hasRole": [
- {
- "@id": "http://www.w3.org/ns/dx/prof/role/specification"
+ "@value": "Operational Security Risk"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#VulnerabilityCreated",
+ "@id": "https://w3id.org/dpv/risk/owl#RightsExercisePrevention",
"@type": [
- "http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
+ "http://www.w3.org/2000/01/rdf-schema#Class",
"http://www.w3.org/2002/07/owl#Class"
],
"http://purl.org/dc/terms/contributor": [
{
- "@value": "Harshvardhan J. Pandit"
+ "@value": "Georg P. Krog, Harshvardhan J. Pandit"
}
],
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
+ "@value": "2022-08-18"
}
],
"http://purl.org/dc/terms/modified": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-08-16"
- }
- ],
- "http://purl.org/dc/terms/source": [
- {
- "@id": "_:Nc0018c079b6b42619d869b3ae63ec70a"
- }
- ],
- "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
- {
- "@id": "https://w3id.org/dpv/risk/owl#"
- }
- ],
- "http://www.w3.org/2000/01/rdf-schema#subClassOf": [
- {
- "@id": "https://w3id.org/dpv/risk/owl#InternalSecurityThreat"
- }
- ],
- "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
- {
- "@language": "en",
- "@value": "accepted"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#definition": [
- {
- "@language": "en",
- "@value": "Something that acts as or causes Vulnerability Created"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#prefLabel": [
- {
- "@language": "en",
- "@value": "Vulnerability Created"
- }
- ]
- },
- {
- "@id": "_:Nc0018c079b6b42619d869b3ae63ec70a",
- "@type": [
- "https://schema.org/WebPage"
- ],
- "https://schema.org/name": [
- {
- "@value": "ISO/IEC 27005:2018"
- }
- ],
- "https://schema.org/url": [
- {
- "@value": "https://www.iso.org/standard/75281.html"
+ "@value": "2024-08-16"
}
- ]
- },
- {
- "@id": "https://w3id.org/dpv/risk/owl#ComponentFailure",
- "@type": [
- "http://www.w3.org/2000/01/rdf-schema#Class",
- "https://w3id.org/dpv/owl#RiskConcept",
- "http://www.w3.org/2002/07/owl#Class"
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
@@ -4734,7 +4647,7 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk"
+ "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -4746,24 +4659,24 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Component Failure"
+ "@value": "Something that acts as or causes Prevent Exercising of Rights"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Component Failure"
+ "@value": "Prevent Exercising of Rights"
}
],
"http://www.w3.org/2004/02/skos/core#scopeNote": [
{
"@language": "en",
- "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of"
+ "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#IdentityTheft",
+ "@id": "https://w3id.org/dpv/risk/owl#Spoofing",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
@@ -4788,7 +4701,10 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:Nad476399871e41a5bd37e1133df27770"
+ "@id": "_:N0085b3ac0b474cf1a64eccdff3718c8d"
+ },
+ {
+ "@id": "_:N539160303302464aa341bdfa53068f22"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -4799,6 +4715,15 @@
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
"@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -4810,60 +4735,54 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Identity Theft"
+ "@value": "Something that acts as or causes Spoofing"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Identity Theft"
+ "@value": "Spoofing"
}
]
},
{
- "@id": "_:Nad476399871e41a5bd37e1133df27770",
+ "@id": "_:N0085b3ac0b474cf1a64eccdff3718c8d",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ENISA Threat Taxonomy 2016"
+ "@value": "ISO/IEC 27005:2018"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view"
+ "@value": "https://www.iso.org/standard/75281.html"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#UnwantedCodeDeletion",
+ "@id": "_:N539160303302464aa341bdfa53068f22",
"@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
- "http://www.w3.org/2000/01/rdf-schema#Class",
- "http://www.w3.org/2002/07/owl#Class"
- ],
- "http://purl.org/dc/terms/contributor": [
- {
- "@value": "Harshvardhan J. Pandit"
- }
- ],
- "http://purl.org/dc/terms/created": [
- {
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
- }
+ "https://schema.org/WebPage"
],
- "http://purl.org/dc/terms/modified": [
+ "https://schema.org/name": [
{
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-08-16"
+ "@value": "ISO/IEC 27005:2018"
}
],
- "http://purl.org/dc/terms/source": [
+ "https://schema.org/url": [
{
- "@id": "_:Nef681cfae64c43969ff8ef7fdde7753a"
+ "@value": "https://www.iso.org/standard/75281.html"
}
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#LegalRisk",
+ "@type": [
+ "http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
+ "http://www.w3.org/2002/07/owl#Class"
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
@@ -4872,7 +4791,7 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
+ "@id": "https://w3id.org/dpv/owl#RiskConcept"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -4884,34 +4803,18 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Unwanted Code Deletion"
+ "@value": "Risks and issues that have their basis in legal requirements and enforcement"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Unwanted Code Deletion"
- }
- ]
- },
- {
- "@id": "_:Nef681cfae64c43969ff8ef7fdde7753a",
- "@type": [
- "https://schema.org/WebPage"
- ],
- "https://schema.org/name": [
- {
- "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments"
- }
- ],
- "https://schema.org/url": [
- {
- "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment"
+ "@value": "Legal Risk"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#ViolatingCodeOfConduct",
+ "@id": "https://w3id.org/dpv/risk/owl#Fraud",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
@@ -4936,7 +4839,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N3d2e8d97024142dca7a47b73cbb8097c"
+ "@id": "_:N0328e4baf7504ceb93cd9bbab8b23099"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -4946,36 +4849,33 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#LegalRisk"
+ "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
{
"@language": "en",
- "@value": "modified"
+ "@value": "accepted"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Violation of Code of Conduct"
+ "@value": "Something that acts as or causes Fraud"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Violating Code of Conduct"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#scopeNote": [
- {
- "@language": "en",
- "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0"
+ "@value": "Fraud"
}
]
},
{
- "@id": "_:N3d2e8d97024142dca7a47b73cbb8097c",
+ "@id": "_:N0328e4baf7504ceb93cd9bbab8b23099",
"@type": [
"https://schema.org/WebPage"
],
@@ -4991,34 +4891,12 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#LoseTrust",
+ "@id": "https://w3id.org/dpv/risk/owl#Privacy",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
- "http://purl.org/dc/terms/contributor": [
- {
- "@value": "Harshvardhan J. Pandit"
- }
- ],
- "http://purl.org/dc/terms/created": [
- {
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
- }
- ],
- "http://purl.org/dc/terms/modified": [
- {
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-08-16"
- }
- ],
- "http://purl.org/dc/terms/source": [
- {
- "@id": "_:Nbb93cef662444084828d04948d35895d"
- }
- ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk/owl#"
@@ -5026,7 +4904,7 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk"
+ "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -5035,37 +4913,15 @@
"@value": "accepted"
}
],
- "http://www.w3.org/2004/02/skos/core#definition": [
- {
- "@language": "en",
- "@value": "Something that acts as or causes Loss of Trust"
- }
- ],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Lose of Trust"
- }
- ]
- },
- {
- "@id": "_:Nbb93cef662444084828d04948d35895d",
- "@type": [
- "https://schema.org/WebPage"
- ],
- "https://schema.org/name": [
- {
- "@value": "ISO/IEC 27005:2018"
- }
- ],
- "https://schema.org/url": [
- {
- "@value": "https://www.iso.org/standard/75281.html"
+ "@value": "Privacy"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#InterceptCommunications",
+ "@id": "https://w3id.org/dpv/risk/owl#Cryptojacking",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
@@ -5090,7 +4946,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N9ba04625c759479eba79e0016163e8e6"
+ "@id": "_:N3adf839933da482c89a2828fc9743969"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -5099,6 +4955,9 @@
}
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept"
+ },
{
"@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
}
@@ -5106,73 +4965,45 @@
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
{
"@language": "en",
- "@value": "modified"
+ "@value": "accepted"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Interception of Communications"
+ "@value": "Something that acts as or causes Cryptojacking"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Intercept Communications"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#scopeNote": [
- {
- "@language": "en",
- "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0"
+ "@value": "Cryptojacking"
}
]
},
{
- "@id": "_:N9ba04625c759479eba79e0016163e8e6",
+ "@id": "_:N3adf839933da482c89a2828fc9743969",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ISO/IEC 27005:2018"
+ "@value": "ENISA Threat Landscape 2021"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.iso.org/standard/75281.html"
+ "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#ViolatingLegalObligation",
+ "@id": "https://w3id.org/dpv/risk/owl#ViolatingPolicy",
"@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
- "http://purl.org/dc/terms/contributor": [
- {
- "@value": "Harshvardhan J. Pandit"
- }
- ],
- "http://purl.org/dc/terms/created": [
- {
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
- }
- ],
- "http://purl.org/dc/terms/modified": [
- {
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-08-16"
- }
- ],
- "http://purl.org/dc/terms/source": [
- {
- "@id": "_:Naf3bb0ebde894641a8c0a69545e7f6cc"
- }
- ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk/owl#"
@@ -5186,46 +5017,24 @@
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
{
"@language": "en",
- "@value": "modified"
+ "@value": "accepted"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Violation of Legal Obligations"
+ "@value": "Something that acts as or causes violation of policy which can be either internal or external policy"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Violation of Legal Obligations"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#scopeNote": [
- {
- "@language": "en",
- "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0"
- }
- ]
- },
- {
- "@id": "_:Naf3bb0ebde894641a8c0a69545e7f6cc",
- "@type": [
- "https://schema.org/WebPage"
- ],
- "https://schema.org/name": [
- {
- "@value": "ISO/IEC 27005:2018"
- }
- ],
- "https://schema.org/url": [
- {
- "@value": "https://www.iso.org/standard/75281.html"
+ "@value": "Violating Policy"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#SocialDisadvantage",
+ "@id": "https://w3id.org/dpv/risk/owl#LoseCustomerConfidence",
"@type": [
"https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -5233,13 +5042,13 @@
],
"http://purl.org/dc/terms/contributor": [
{
- "@value": "Georg P. Krog"
+ "@value": "Harshvardhan J. Pandit"
}
],
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-19"
+ "@value": "2022-08-17"
}
],
"http://purl.org/dc/terms/modified": [
@@ -5248,6 +5057,11 @@
"@value": "2024-08-16"
}
],
+ "http://purl.org/dc/terms/source": [
+ {
+ "@id": "_:N669b51dd9b0f4a71983f16dfc274956a"
+ }
+ ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk/owl#"
@@ -5255,7 +5069,7 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk"
+ "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -5267,21 +5081,37 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Social Disadvantage"
+ "@value": "Something that acts as or causes Loss of Customer Confidence"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
- "@language": "en",
- "@value": "Social Disadvantage"
+ "@language": "en",
+ "@value": "Lose of Customer Confidence"
+ }
+ ]
+ },
+ {
+ "@id": "_:N669b51dd9b0f4a71983f16dfc274956a",
+ "@type": [
+ "https://schema.org/WebPage"
+ ],
+ "https://schema.org/name": [
+ {
+ "@value": "ISO/IEC 27005:2018"
+ }
+ ],
+ "https://schema.org/url": [
+ {
+ "@value": "https://www.iso.org/standard/75281.html"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#ViolatingEthicsCode",
+ "@id": "https://w3id.org/dpv/risk/owl#PsychologicalHarm",
"@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
"http://purl.org/dc/terms/contributor": [
@@ -5303,7 +5133,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:Nd8ddc1f8024a4418b62c344837cff0cd"
+ "@id": "_:N0ddf524630684b719d7f03f907c20cff"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -5313,57 +5143,78 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#LegalRisk"
+ "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
{
"@language": "en",
- "@value": "modified"
+ "@value": "accepted"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Violation of Ethics Code"
+ "@value": "Something that acts as or causes Psychological Harm"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Violating Ethics Code"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#scopeNote": [
- {
- "@language": "en",
- "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0"
+ "@value": "Psychological Harm"
}
]
},
{
- "@id": "_:Nd8ddc1f8024a4418b62c344837cff0cd",
+ "@id": "_:N0ddf524630684b719d7f03f907c20cff",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ISO/IEC 27005:2018"
+ "@value": "ENISA Reference Incident Classification Taxonomy 2018"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.iso.org/standard/75281.html"
+ "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#LoseCustomerConfidence",
+ "@id": "https://w3id.org/dpv/risk/owl#AvailabilityBreach",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
+ "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#"
+ }
+ ],
+ "http://www.w3.org/2000/01/rdf-schema#subClassOf": [
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#DataBreach"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept"
+ }
+ ],
+ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
+ {
+ "@language": "en",
+ "@value": "accepted"
+ }
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeModification",
+ "@type": [
+ "https://w3id.org/dpv/owl#RiskConcept",
+ "http://www.w3.org/2000/01/rdf-schema#Class",
+ "http://www.w3.org/2002/07/owl#Class"
+ ],
"http://purl.org/dc/terms/contributor": [
{
"@value": "Harshvardhan J. Pandit"
@@ -5383,7 +5234,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N0d138f94265e46f293490fbe0fc8074c"
+ "@id": "_:Ncecbd81981b3460f9cede6031d4ab8b1"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -5393,7 +5244,10 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk"
+ "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -5405,37 +5259,37 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Loss of Customer Confidence"
+ "@value": "Something that acts as or causes Unauthorised Code Modification"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Lose of Customer Confidence"
+ "@value": "Unauthorised Code Modification"
}
]
},
{
- "@id": "_:N0d138f94265e46f293490fbe0fc8074c",
+ "@id": "_:Ncecbd81981b3460f9cede6031d4ab8b1",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ISO/IEC 27005:2018"
+ "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.iso.org/standard/75281.html"
+ "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#RightsImpact",
+ "@id": "https://w3id.org/dpv/risk/owl#ViolenceAgainstChildren",
"@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
"http://purl.org/dc/terms/contributor": [
@@ -5457,7 +5311,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N4e0b95db2d414e7588f607d2edf6902e"
+ "@id": "_:N50def33314ee4442bf7e77161e51165b"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -5467,10 +5321,7 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/owl#Impact"
- },
- {
- "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk"
+ "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -5482,40 +5333,40 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Impact to Rights"
+ "@value": "Something that acts as or causes Child Violence"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Impact to Rights"
+ "@value": "Violence against children"
}
],
"http://www.w3.org/2004/02/skos/core#scopeNote": [
{
"@language": "en",
- "@value": "This concept was called \"ImpactToRights\" in DPV 2.0"
+ "@value": "This concept was called \"ChildViolence\" in DPV 2.0"
}
]
},
{
- "@id": "_:N4e0b95db2d414e7588f607d2edf6902e",
+ "@id": "_:N50def33314ee4442bf7e77161e51165b",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ISO/IEC 27005:2018"
+ "@value": "ENISA Reference Incident Classification Taxonomy 2018"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.iso.org/standard/75281.html"
+ "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeAccess",
+ "@id": "https://w3id.org/dpv/risk/owl#UnwantedCodeDeletion",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
@@ -5540,7 +5391,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N8193907d23bd43dc8b146573989b8a0d"
+ "@id": "_:N9b03e23aa8864f4288a1885778e3b1e4"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -5551,6 +5402,12 @@
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
"@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -5562,18 +5419,18 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Unauthorised Code Access"
+ "@value": "Something that acts as or causes Unwanted Code Deletion"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Unauthorised Code Access"
+ "@value": "Unwanted Code Deletion"
}
]
},
{
- "@id": "_:N8193907d23bd43dc8b146573989b8a0d",
+ "@id": "_:N9b03e23aa8864f4288a1885778e3b1e4",
"@type": [
"https://schema.org/WebPage"
],
@@ -5589,7 +5446,7 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#ExposureToHarmfulSpeech",
+ "@id": "https://w3id.org/dpv/risk/owl#CopyrightViolation",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
@@ -5614,7 +5471,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:Ne595b225e5ee4cc2b2374256ef05fa2e"
+ "@id": "_:N3984b17b1694455793b94c3ad850178d"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -5624,7 +5481,7 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk"
+ "@id": "https://w3id.org/dpv/risk/owl#LegalRisk"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -5636,24 +5493,18 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Harmful Speech"
+ "@value": "Something that acts as or causes Copyright Violation"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Exposure to Harmful Speech"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#scopeNote": [
- {
- "@language": "en",
- "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0"
+ "@value": "Copyright Violation"
}
]
},
{
- "@id": "_:Ne595b225e5ee4cc2b2374256ef05fa2e",
+ "@id": "_:N3984b17b1694455793b94c3ad850178d",
"@type": [
"https://schema.org/WebPage"
],
@@ -5669,10 +5520,10 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#EquipmentMalfunction",
+ "@id": "https://w3id.org/dpv/risk/owl#Scam",
"@type": [
- "http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
+ "http://www.w3.org/2000/01/rdf-schema#Class",
"http://www.w3.org/2002/07/owl#Class"
],
"http://purl.org/dc/terms/contributor": [
@@ -5694,7 +5545,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N7f1dc230141c4448a99f28f362191020"
+ "@id": "_:Nea270aca30b44f5a8cfda049ee8bf631"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -5704,7 +5555,10 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk"
+ "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -5716,24 +5570,18 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Equipment Malfunction"
+ "@value": "Something that acts as or causes Scam"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Equipment Malfunction"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#scopeNote": [
- {
- "@language": "en",
- "@value": "Here equipment refers to physical equipment"
+ "@value": "Scam"
}
]
},
{
- "@id": "_:N7f1dc230141c4448a99f28f362191020",
+ "@id": "_:Nea270aca30b44f5a8cfda049ee8bf631",
"@type": [
"https://schema.org/WebPage"
],
@@ -5749,10 +5597,10 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataAccess",
+ "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemModification",
"@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
"http://purl.org/dc/terms/contributor": [
@@ -5774,7 +5622,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:Nc799e152712d4ee48d59c2a1366fca7f"
+ "@id": "_:N029a97b214024c18a899586cb3864d2a"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -5783,6 +5631,9 @@
}
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept"
+ },
{
"@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
}
@@ -5796,34 +5647,34 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Unauthorised Data Access"
+ "@value": "Something that acts as or causes Unauthorised System Modification"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Unauthorised Data Access"
+ "@value": "Unauthorised System Modification"
}
]
},
{
- "@id": "_:Nc799e152712d4ee48d59c2a1366fca7f",
+ "@id": "_:N029a97b214024c18a899586cb3864d2a",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ENISA Reference Incident Classification Taxonomy 2018"
+ "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
+ "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#LoseGoodwill",
+ "@id": "https://w3id.org/dpv/risk/owl#Injury",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
@@ -5848,7 +5699,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N4f8237833a8141b2bb3c31cf5176bf42"
+ "@id": "_:Na6c5e17bb8ac4135b62412f66dd88460"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -5858,7 +5709,7 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk"
+ "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -5870,18 +5721,18 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Loss of Goodwill"
+ "@value": "Something that acts as or causes Injury"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Lose of Goodwill"
+ "@value": "Injury"
}
]
},
{
- "@id": "_:N4f8237833a8141b2bb3c31cf5176bf42",
+ "@id": "_:Na6c5e17bb8ac4135b62412f66dd88460",
"@type": [
"https://schema.org/WebPage"
],
@@ -5897,7 +5748,7 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#Reward",
+ "@id": "https://w3id.org/dpv/risk/owl#PhysicalAssault",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
@@ -5905,13 +5756,13 @@
],
"http://purl.org/dc/terms/contributor": [
{
- "@value": "Georg P. Krog, Harshvardhan J. Pandit"
+ "@value": "Harshvardhan J. Pandit"
}
],
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-04-14"
+ "@value": "2022-08-17"
}
],
"http://purl.org/dc/terms/modified": [
@@ -5920,6 +5771,11 @@
"@value": "2024-08-16"
}
],
+ "http://purl.org/dc/terms/source": [
+ {
+ "@id": "_:N6b8cf1ee50ba4ea081a101b53baf3bb3"
+ }
+ ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk/owl#"
@@ -5927,7 +5783,7 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact"
+ "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -5939,42 +5795,34 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee"
+ "@value": "Something that acts as or causes Physical Assault"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Reward"
+ "@value": "Physical Assault"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#AvailabilityBreach",
+ "@id": "_:N6b8cf1ee50ba4ea081a101b53baf3bb3",
"@type": [
- "http://www.w3.org/2000/01/rdf-schema#Class",
- "https://w3id.org/dpv/owl#RiskConcept",
- "http://www.w3.org/2002/07/owl#Class"
- ],
- "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
- {
- "@id": "https://w3id.org/dpv/risk/owl#"
- }
+ "https://schema.org/WebPage"
],
- "http://www.w3.org/2000/01/rdf-schema#subClassOf": [
+ "https://schema.org/name": [
{
- "@id": "https://w3id.org/dpv/risk/owl#DataBreach"
+ "@value": "ISO/IEC 27005:2018"
}
],
- "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
+ "https://schema.org/url": [
{
- "@language": "en",
- "@value": "accepted"
+ "@value": "https://www.iso.org/standard/75281.html"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#Benefit",
+ "@id": "https://w3id.org/dpv/risk/owl#PublicOrderBreach",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
@@ -5982,13 +5830,13 @@
],
"http://purl.org/dc/terms/contributor": [
{
- "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres"
+ "@value": "Harshvardhan J. Pandit"
}
],
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-03-23"
+ "@value": "2022-08-17"
}
],
"http://purl.org/dc/terms/modified": [
@@ -5997,6 +5845,11 @@
"@value": "2024-08-16"
}
],
+ "http://purl.org/dc/terms/source": [
+ {
+ "@id": "_:N1d102af8ecd94ce3a875a9a2a7e78bcc"
+ }
+ ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk/owl#"
@@ -6004,7 +5857,7 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact"
+ "@id": "https://w3id.org/dpv/risk/owl#LegalRisk"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -6016,21 +5869,37 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes benefits"
+ "@value": "Something that acts as or causes Public Order Breach"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Benefit"
+ "@value": "Public Order Breach"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#SexualViolence",
+ "@id": "_:N1d102af8ecd94ce3a875a9a2a7e78bcc",
+ "@type": [
+ "https://schema.org/WebPage"
+ ],
+ "https://schema.org/name": [
+ {
+ "@value": "ISO/IEC 27005:2018"
+ }
+ ],
+ "https://schema.org/url": [
+ {
+ "@value": "https://www.iso.org/standard/75281.html"
+ }
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#Sabotage",
"@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
"http://purl.org/dc/terms/contributor": [
@@ -6052,7 +5921,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:Nbeddee22b7a841e39879764ab63949f8"
+ "@id": "_:N2fc72d8ce45943bcaad06c0a96aac629"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -6062,7 +5931,13 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk"
+ "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -6074,18 +5949,18 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Sexual Violence"
+ "@value": "Something that acts as or causes Sabotage"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Sexual Violence"
+ "@value": "Sabotage"
}
]
},
{
- "@id": "_:Nbeddee22b7a841e39879764ab63949f8",
+ "@id": "_:N2fc72d8ce45943bcaad06c0a96aac629",
"@type": [
"https://schema.org/WebPage"
],
@@ -6101,7 +5976,7 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#LoseReputation",
+ "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccountCredentials",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
@@ -6126,7 +6001,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N0282f3114f5b4278b632620b9b954c7d"
+ "@id": "_:N1005943ded74408ea68c811475686000"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -6136,7 +6011,10 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk"
+ "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -6148,39 +6026,56 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Loss of Reputation"
+ "@value": "Something that acts as or causes Account Credentials to be compromised"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Lose of Reputation"
+ "@value": "Compromise Account Credentials"
}
]
},
{
- "@id": "_:N0282f3114f5b4278b632620b9b954c7d",
+ "@id": "_:N1005943ded74408ea68c811475686000",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ISO/IEC 27005:2018"
+ "@value": "ENISA Reference Incident Classification Taxonomy 2018"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.iso.org/standard/75281.html"
+ "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#AccidentalMisuse",
+ "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedReidentification",
"@type": [
"https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
"http://www.w3.org/2002/07/owl#Class"
],
+ "http://purl.org/dc/terms/contributor": [
+ {
+ "@value": "Georg P. Krog"
+ }
+ ],
+ "http://purl.org/dc/terms/created": [
+ {
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2022-08-19"
+ }
+ ],
+ "http://purl.org/dc/terms/modified": [
+ {
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2024-08-16"
+ }
+ ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk/owl#"
@@ -6188,7 +6083,10 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#UserRisks"
+ "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -6200,18 +6098,18 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Accidental Misuse"
+ "@value": "Something that acts as or causes Unauthorised Re-Identification"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Accidental Misuse"
+ "@value": "Unauthorised Re-Identification"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#Spoofing",
+ "@id": "https://w3id.org/dpv/risk/owl#ErroneousSystemUse",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
@@ -6236,10 +6134,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N603a4b8fadf24d23ac9c224927644c9d"
- },
- {
- "@id": "_:N698cebdfba864777b23d25052c4d2493"
+ "@id": "_:N258e312c37aa4354bed73603ef7a36f6"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -6249,10 +6144,7 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
- },
- {
- "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk"
+ "@id": "https://w3id.org/dpv/risk/owl#UserRisks"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -6264,34 +6156,18 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Spoofing"
+ "@value": "Something that acts as or causes Erroneous System Use"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Spoofing"
- }
- ]
- },
- {
- "@id": "_:N603a4b8fadf24d23ac9c224927644c9d",
- "@type": [
- "https://schema.org/WebPage"
- ],
- "https://schema.org/name": [
- {
- "@value": "ISO/IEC 27005:2018"
- }
- ],
- "https://schema.org/url": [
- {
- "@value": "https://www.iso.org/standard/75281.html"
+ "@value": "Erroneous System Use"
}
]
},
{
- "@id": "_:N698cebdfba864777b23d25052c4d2493",
+ "@id": "_:N258e312c37aa4354bed73603ef7a36f6",
"@type": [
"https://schema.org/WebPage"
],
@@ -6307,10 +6183,10 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#MaterialDamage",
+ "@id": "https://w3id.org/dpv/risk/owl#SystemFailure",
"@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
"http://purl.org/dc/terms/contributor": [
@@ -6321,7 +6197,7 @@
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-03-30"
+ "@value": "2022-08-17"
}
],
"http://purl.org/dc/terms/modified": [
@@ -6330,6 +6206,11 @@
"@value": "2024-08-16"
}
],
+ "http://purl.org/dc/terms/source": [
+ {
+ "@id": "_:Nd794c9a0064e4fe6bb3a0ebd38859b9b"
+ }
+ ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk/owl#"
@@ -6337,7 +6218,10 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#LegalRisk"
+ "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -6349,53 +6233,44 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Material Damage"
+ "@value": "Something that acts as or causes System Failure"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Material Damage"
+ "@value": "System Failure"
}
],
"http://www.w3.org/2004/02/skos/core#scopeNote": [
{
"@language": "en",
- "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms"
+ "@value": "Here system refers to both hardware and software systems"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#DenialServiceAttack",
+ "@id": "_:Nd794c9a0064e4fe6bb3a0ebd38859b9b",
"@type": [
- "http://www.w3.org/2000/01/rdf-schema#Class",
- "https://w3id.org/dpv/owl#RiskConcept",
- "http://www.w3.org/2002/07/owl#Class"
- ],
- "http://purl.org/dc/terms/contributor": [
- {
- "@value": "Harshvardhan J. Pandit"
- }
- ],
- "http://purl.org/dc/terms/created": [
- {
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
- }
+ "https://schema.org/WebPage"
],
- "http://purl.org/dc/terms/modified": [
+ "https://schema.org/name": [
{
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-08-16"
+ "@value": "ENISA Threat Landscape for Ransomware Attacks 2022"
}
],
- "http://purl.org/dc/terms/source": [
- {
- "@id": "_:Nf82ac345e0fe44a394f7da0ec78ef801"
- },
+ "https://schema.org/url": [
{
- "@id": "_:N51a29309d655420e8611a50e7d2baa7c"
+ "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks"
}
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity",
+ "@type": [
+ "https://w3id.org/dpv/owl#RiskConcept",
+ "http://www.w3.org/2000/01/rdf-schema#Class",
+ "http://www.w3.org/2002/07/owl#Class"
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
@@ -6403,8 +6278,17 @@
}
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept"
+ },
{
"@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -6416,54 +6300,39 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Denial of Service Attack (DoS)"
+ "@value": "Something that acts as or causes Unauthorised Activity"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Denial of Service Attack (DoS)"
+ "@value": "Unauthorised Activity"
}
]
},
{
- "@id": "_:Nf82ac345e0fe44a394f7da0ec78ef801",
+ "@id": "https://w3id.org/dpv/risk/owl#Payment",
"@type": [
- "https://schema.org/WebPage"
- ],
- "https://schema.org/name": [
- {
- "@value": "ISO/IEC 27005:2018"
- }
+ "http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
+ "http://www.w3.org/2002/07/owl#Class"
],
- "https://schema.org/url": [
+ "http://purl.org/dc/terms/contributor": [
{
- "@value": "https://www.iso.org/standard/75281.html"
+ "@value": "Georg P. Krog, Harshvardhan J. Pandit"
}
- ]
- },
- {
- "@id": "_:N51a29309d655420e8611a50e7d2baa7c",
- "@type": [
- "https://schema.org/WebPage"
],
- "https://schema.org/name": [
+ "http://purl.org/dc/terms/created": [
{
- "@value": "ISO/IEC 27005:2018"
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2024-04-14"
}
],
- "https://schema.org/url": [
+ "http://purl.org/dc/terms/modified": [
{
- "@value": "https://www.iso.org/standard/75281.html"
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2024-08-16"
}
- ]
- },
- {
- "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack",
- "@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
- "http://www.w3.org/2000/01/rdf-schema#Class",
- "http://www.w3.org/2002/07/owl#Class"
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
@@ -6472,7 +6341,7 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
+ "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -6484,21 +6353,21 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes an attack on security with the aim of undermining it"
+ "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Security Attack"
+ "@value": "Payment"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#LoseCredibility",
+ "@id": "https://w3id.org/dpv/risk/owl#ExposureToHarmfulSpeech",
"@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
"http://purl.org/dc/terms/contributor": [
@@ -6520,7 +6389,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N347037135ba54cefae0a2a69a47e52d9"
+ "@id": "_:N95f46ba999c74717949420ed05a75570"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -6530,7 +6399,7 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk"
+ "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -6542,68 +6411,43 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Loss of Credibility"
+ "@value": "Something that acts as or causes Harmful Speech"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Lose of Credibility"
- }
- ]
- },
- {
- "@id": "_:N347037135ba54cefae0a2a69a47e52d9",
- "@type": [
- "https://schema.org/WebPage"
- ],
- "https://schema.org/name": [
- {
- "@value": "ISO/IEC 27005:2018"
+ "@value": "Exposure to Harmful Speech"
}
],
- "https://schema.org/url": [
+ "http://www.w3.org/2004/02/skos/core#scopeNote": [
{
- "@value": "https://www.iso.org/standard/75281.html"
+ "@language": "en",
+ "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf",
+ "@id": "_:N95f46ba999c74717949420ed05a75570",
"@type": [
- "http://www.w3.org/ns/dx/prof/ResourceDescriptor"
- ],
- "http://purl.org/dc/terms/conformsTo": [
- {
- "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#"
- }
- ],
- "http://purl.org/dc/terms/format": [
- {
- "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml"
- }
- ],
- "http://purl.org/dc/terms/title": [
- {
- "@value": "Risk Concepts - RDF/XML serialiation"
- }
+ "https://schema.org/WebPage"
],
- "http://www.w3.org/ns/dx/prof/hasArtifact": [
+ "https://schema.org/name": [
{
- "@id": "https://w3id.org/dpv/risk/risk-owl.rdf"
+ "@value": "ENISA Reference Incident Classification Taxonomy 2018"
}
],
- "http://www.w3.org/ns/dx/prof/hasRole": [
+ "https://schema.org/url": [
{
- "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary"
+ "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#FinancialLoss",
+ "@id": "https://w3id.org/dpv/risk/owl#MaliciousCodeAttack",
"@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
"http://purl.org/dc/terms/contributor": [
@@ -6625,7 +6469,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N0296c48d481641d492572a05652b6bf5"
+ "@id": "_:N625dc3c061c74eec9f96d171c60fd3c0"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -6635,7 +6479,16 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact"
+ "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -6647,37 +6500,37 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity"
+ "@value": "Something that acts as or causes Malicious Code Attack"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Financial Loss"
+ "@value": "Malicious Code Attack"
}
]
},
{
- "@id": "_:N0296c48d481641d492572a05652b6bf5",
+ "@id": "_:N625dc3c061c74eec9f96d171c60fd3c0",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ISO/IEC 27005:2018"
+ "@value": "ENISA Reference Incident Classification Taxonomy 2018"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.iso.org/standard/75281.html"
+ "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage",
+ "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemAccess",
"@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
"http://purl.org/dc/terms/contributor": [
@@ -6688,7 +6541,7 @@
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-03-30"
+ "@value": "2022-08-17"
}
],
"http://purl.org/dc/terms/modified": [
@@ -6697,6 +6550,11 @@
"@value": "2024-08-16"
}
],
+ "http://purl.org/dc/terms/source": [
+ {
+ "@id": "_:N6fdf74981d95420a82b9c97acf9aa9eb"
+ }
+ ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk/owl#"
@@ -6704,7 +6562,13 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#LegalRisk"
+ "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -6716,24 +6580,34 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Non-Material Damage"
+ "@value": "Something that acts as or causes Unauthorised System Access"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Non-Material Damage"
+ "@value": "Unauthorised System Access"
}
+ ]
+ },
+ {
+ "@id": "_:N6fdf74981d95420a82b9c97acf9aa9eb",
+ "@type": [
+ "https://schema.org/WebPage"
],
- "http://www.w3.org/2004/02/skos/core#scopeNote": [
+ "https://schema.org/name": [
{
- "@language": "en",
- "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms"
+ "@value": "ISO/IEC 27005:2018"
+ }
+ ],
+ "https://schema.org/url": [
+ {
+ "@value": "https://www.iso.org/standard/75281.html"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeDisclosure",
+ "@id": "https://w3id.org/dpv/risk/owl#BruteForceAuthorisations",
"@type": [
"https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -6758,7 +6632,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N540e39aa17014568ba5a2b03534c1f19"
+ "@id": "_:Nb75b090fdcda4ec38e841680681bf642"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -6767,8 +6641,14 @@
}
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept"
+ },
{
"@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -6780,39 +6660,56 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Unauthorised Code Disclosure"
+ "@value": "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Unauthorised Code Disclosure"
+ "@value": "Brute Force Authorisations"
}
]
},
{
- "@id": "_:N540e39aa17014568ba5a2b03534c1f19",
+ "@id": "_:Nb75b090fdcda4ec38e841680681bf642",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments"
+ "@value": "ENISA Reference Incident Classification Taxonomy 2018"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment"
+ "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#EnvironmentalRisk",
+ "@id": "https://w3id.org/dpv/risk/owl#Compensation",
"@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
+ "http://purl.org/dc/terms/contributor": [
+ {
+ "@value": "Georg P. Krog, Harshvardhan J. Pandit"
+ }
+ ],
+ "http://purl.org/dc/terms/created": [
+ {
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2024-04-14"
+ }
+ ],
+ "http://purl.org/dc/terms/modified": [
+ {
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2024-08-16"
+ }
+ ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk/owl#"
@@ -6820,7 +6717,7 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/owl#RiskConcept"
+ "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -6832,18 +6729,18 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Risks and issues that have their origin in environment or can affect the environment at large"
+ "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Environmental Risk"
+ "@value": "Compensation"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#Discrimination",
+ "@id": "https://w3id.org/dpv/risk/owl#RightsLimitation",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
@@ -6851,13 +6748,13 @@
],
"http://purl.org/dc/terms/contributor": [
{
- "@value": "Georg P. Krog"
+ "@value": "Georg P. Krog, Harshvardhan J. Pandit"
}
],
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-19"
+ "@value": "2022-08-18"
}
],
"http://purl.org/dc/terms/modified": [
@@ -6885,23 +6782,51 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Discrimination"
+ "@value": "Something that acts as or causes Limitation of Rights"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Discrimination"
+ "@value": "Limitation of Rights"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#scopeNote": [
+ {
+ "@language": "en",
+ "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk",
+ "@id": "https://w3id.org/dpv/risk/owl#IdentityFraud",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
+ "http://purl.org/dc/terms/contributor": [
+ {
+ "@value": "Harshvardhan J. Pandit"
+ }
+ ],
+ "http://purl.org/dc/terms/created": [
+ {
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2022-08-17"
+ }
+ ],
+ "http://purl.org/dc/terms/modified": [
+ {
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2024-08-16"
+ }
+ ],
+ "http://purl.org/dc/terms/source": [
+ {
+ "@id": "_:Nc74530c53d534886a66e5a7f741398bb"
+ }
+ ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk/owl#"
@@ -6909,7 +6834,10 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/owl#RiskConcept"
+ "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -6921,18 +6849,34 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Risks and issues that affect the reputation of the organisation"
+ "@value": "Something that acts as or causes Identity Fraud"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Reputational Risk"
+ "@value": "Identity Fraud"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeModification",
+ "@id": "_:Nc74530c53d534886a66e5a7f741398bb",
+ "@type": [
+ "https://schema.org/WebPage"
+ ],
+ "https://schema.org/name": [
+ {
+ "@value": "ENISA Threat Taxonomy 2016"
+ }
+ ],
+ "https://schema.org/url": [
+ {
+ "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view"
+ }
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#Reward",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
@@ -6940,13 +6884,13 @@
],
"http://purl.org/dc/terms/contributor": [
{
- "@value": "Harshvardhan J. Pandit"
+ "@value": "Georg P. Krog, Harshvardhan J. Pandit"
}
],
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
+ "@value": "2024-04-14"
}
],
"http://purl.org/dc/terms/modified": [
@@ -6955,11 +6899,6 @@
"@value": "2024-08-16"
}
],
- "http://purl.org/dc/terms/source": [
- {
- "@id": "_:N8ae12eb2b96a4c7e97a8739ee00ffe80"
- }
- ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk/owl#"
@@ -6967,7 +6906,7 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
+ "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -6979,37 +6918,21 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Unauthorised Code Modification"
+ "@value": "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Unauthorised Code Modification"
- }
- ]
- },
- {
- "@id": "_:N8ae12eb2b96a4c7e97a8739ee00ffe80",
- "@type": [
- "https://schema.org/WebPage"
- ],
- "https://schema.org/name": [
- {
- "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments"
- }
- ],
- "https://schema.org/url": [
- {
- "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment"
+ "@value": "Reward"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#ViolenceAgainstChildren",
+ "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataModification",
"@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
"http://purl.org/dc/terms/contributor": [
@@ -7031,7 +6954,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:Nb34535276ddd4a56ac18dcc8fc489cbb"
+ "@id": "_:Nb76ee4ad00614561b02ea8b1fd3da77c"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -7041,7 +6964,10 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk"
+ "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -7053,24 +6979,18 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Child Violence"
+ "@value": "Something that acts as or causes Unauthorised Data Modification"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Violence against children"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#scopeNote": [
- {
- "@language": "en",
- "@value": "This concept was called \"ChildViolence\" in DPV 2.0"
+ "@value": "Unauthorised Data Modification"
}
]
},
{
- "@id": "_:Nb34535276ddd4a56ac18dcc8fc489cbb",
+ "@id": "_:Nb76ee4ad00614561b02ea8b1fd3da77c",
"@type": [
"https://schema.org/WebPage"
],
@@ -7086,7 +7006,7 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#Terrorism",
+ "@id": "https://w3id.org/dpv/risk/owl#DataBreach",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
@@ -7111,7 +7031,15 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:Nf6a25073f9274363bcb649fe8540fc70"
+ "@id": "_:N0353966748ad43cc9b9c03081ec6b6f9"
+ }
+ ],
+ "http://purl.org/vocab/vann/example": [
+ {
+ "@id": "https://w3id.org/dpv/examples/owl#E0071"
+ },
+ {
+ "@id": "https://w3id.org/dpv/examples/owl#E0069"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -7121,7 +7049,16 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk"
+ "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -7133,18 +7070,18 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Terrorism"
+ "@value": "Something that acts as or causes Data Breach"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Terrorism"
+ "@value": "Data Breach"
}
]
},
{
- "@id": "_:Nf6a25073f9274363bcb649fe8540fc70",
+ "@id": "_:N0353966748ad43cc9b9c03081ec6b6f9",
"@type": [
"https://schema.org/WebPage"
],
@@ -7160,7 +7097,7 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#PersonalSafetyEndangerment",
+ "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataAccess",
"@type": [
"https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -7185,7 +7122,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:Na66b6d002d3f448981a58870da1a686e"
+ "@id": "_:N0eacc049940646a99623da2cd6a2d394"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -7195,7 +7132,10 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk"
+ "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -7207,34 +7147,34 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Personal Safety Endangerment"
+ "@value": "Something that acts as or causes Unauthorised Data Access"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Personal Safety Endangerment"
+ "@value": "Unauthorised Data Access"
}
]
},
{
- "@id": "_:Na66b6d002d3f448981a58870da1a686e",
+ "@id": "_:N0eacc049940646a99623da2cd6a2d394",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ISO/IEC 27005:2018"
+ "@value": "ENISA Reference Incident Classification Taxonomy 2018"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.iso.org/standard/75281.html"
+ "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#RightsViolation",
+ "@id": "https://w3id.org/dpv/risk/owl#UnwantedDataDeletion",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
@@ -7242,13 +7182,13 @@
],
"http://purl.org/dc/terms/contributor": [
{
- "@value": "Georg P. Krog, Harshvardhan J. Pandit"
+ "@value": "Harshvardhan J. Pandit"
}
],
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-18"
+ "@value": "2022-08-17"
}
],
"http://purl.org/dc/terms/modified": [
@@ -7257,6 +7197,11 @@
"@value": "2024-08-16"
}
],
+ "http://purl.org/dc/terms/source": [
+ {
+ "@id": "_:Nde382e9a51c445d69476b298827b1cbe"
+ }
+ ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk/owl#"
@@ -7264,7 +7209,13 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk"
+ "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -7276,60 +7227,34 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Violation of Rights"
+ "@value": "Something that acts as or causes Unwanted Data Deletion"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Violation of Rights"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#scopeNote": [
- {
- "@language": "en",
- "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0"
+ "@value": "Unwanted Data Deletion"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#LegalRisk",
+ "@id": "_:Nde382e9a51c445d69476b298827b1cbe",
"@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
- "http://www.w3.org/2000/01/rdf-schema#Class",
- "http://www.w3.org/2002/07/owl#Class"
- ],
- "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
- {
- "@id": "https://w3id.org/dpv/risk/owl#"
- }
- ],
- "http://www.w3.org/2000/01/rdf-schema#subClassOf": [
- {
- "@id": "https://w3id.org/dpv/owl#RiskConcept"
- }
- ],
- "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
- {
- "@language": "en",
- "@value": "accepted"
- }
+ "https://schema.org/WebPage"
],
- "http://www.w3.org/2004/02/skos/core#definition": [
+ "https://schema.org/name": [
{
- "@language": "en",
- "@value": "Risks and issues that have their basis in legal requirements and enforcement"
+ "@value": "ISO/IEC 27005:2018"
}
],
- "http://www.w3.org/2004/02/skos/core#prefLabel": [
+ "https://schema.org/url": [
{
- "@language": "en",
- "@value": "Legal Risk"
+ "@value": "https://www.iso.org/standard/75281.html"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#ViolatingPolicy",
+ "@id": "https://w3id.org/dpv/risk/owl#IntentionalMisuse",
"@type": [
"https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -7342,7 +7267,7 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#LegalRisk"
+ "@id": "https://w3id.org/dpv/risk/owl#UserRisks"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -7354,21 +7279,21 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes violation of policy which can be either internal or external policy"
+ "@value": "Intentional Misuse"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Violating Policy"
+ "@value": "Intentional Misuse"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#ViolatingContractualObligation",
+ "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage",
"@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
"http://purl.org/dc/terms/contributor": [
@@ -7379,7 +7304,7 @@
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
+ "@value": "2022-03-30"
}
],
"http://purl.org/dc/terms/modified": [
@@ -7388,11 +7313,6 @@
"@value": "2024-08-16"
}
],
- "http://purl.org/dc/terms/source": [
- {
- "@id": "_:N1802c2900f5b4c578896c91c3149381d"
- }
- ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk/owl#"
@@ -7406,60 +7326,80 @@
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
{
"@language": "en",
- "@value": "modified"
+ "@value": "accepted"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Violation of Contractual Obligations"
+ "@value": "Something that acts as or causes Non-Material Damage"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Violation of Contractual Obligation"
+ "@value": "Non-Material Damage"
}
],
"http://www.w3.org/2004/02/skos/core#scopeNote": [
{
"@language": "en",
- "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0"
+ "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms"
}
]
},
{
- "@id": "_:N1802c2900f5b4c578896c91c3149381d",
+ "@id": "https://w3id.org/dpv/risk/owl#JudicialPenalty",
"@type": [
- "https://schema.org/WebPage"
+ "http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
+ "http://www.w3.org/2002/07/owl#Class"
],
- "https://schema.org/name": [
+ "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
- "@value": "ISO/IEC 27005:2018"
+ "@id": "https://w3id.org/dpv/risk/owl#"
}
],
- "https://schema.org/url": [
+ "http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@value": "https://www.iso.org/standard/75281.html"
+ "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact"
+ }
+ ],
+ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
+ {
+ "@language": "en",
+ "@value": "accepted"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#definition": [
+ {
+ "@language": "en",
+ "@value": "Something that involves or causes judicial penalties to be paid"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#prefLabel": [
+ {
+ "@language": "en",
+ "@value": "Judicial Penalty"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#Misuse",
+ "@id": "https://w3id.org/dpv/risk/owl#Detriment",
"@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
"http://purl.org/dc/terms/contributor": [
{
- "@value": "Delaram Golpayegani"
+ "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves"
}
],
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-06-11"
+ "@value": "2022-03-23"
}
],
"http://purl.org/dc/terms/modified": [
@@ -7475,7 +7415,7 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#UserRisks"
+ "@id": "https://w3id.org/dpv/risk/owl#LegalRisk"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -7487,18 +7427,18 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Misuse"
+ "@value": "Something that acts as or causes Detriment"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Misuse"
+ "@value": "Detriment"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#DistributedDenialServiceAttack",
+ "@id": "https://w3id.org/dpv/risk/owl#LoseCredibility",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
@@ -7523,7 +7463,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N842f6dd3b92c482180f56ce6a495c382"
+ "@id": "_:N2c068c379d9b4c2b8da0937ad8be6a81"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -7533,7 +7473,7 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
+ "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -7545,18 +7485,18 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"
+ "@value": "Something that acts as or causes Loss of Credibility"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Distributed Denial of Service Attack (DDoS)"
+ "@value": "Lose of Credibility"
}
]
},
{
- "@id": "_:N842f6dd3b92c482180f56ce6a495c382",
+ "@id": "_:N2c068c379d9b4c2b8da0937ad8be6a81",
"@type": [
"https://schema.org/WebPage"
],
@@ -7572,7 +7512,38 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataModification",
+ "@id": "https://w3id.org/dpv/risk/owl#serialisation-html",
+ "@type": [
+ "http://www.w3.org/ns/dx/prof/ResourceDescriptor"
+ ],
+ "http://purl.org/dc/terms/conformsTo": [
+ {
+ "@id": "https://www.w3.org/TR/html/"
+ }
+ ],
+ "http://purl.org/dc/terms/format": [
+ {
+ "@id": "https://www.iana.org/assignments/media-types/text/html"
+ }
+ ],
+ "http://purl.org/dc/terms/title": [
+ {
+ "@value": "Risk Concepts - HTML serialiation"
+ }
+ ],
+ "http://www.w3.org/ns/dx/prof/hasArtifact": [
+ {
+ "@id": "https://w3id.org/dpv/risk/risk-owl.html"
+ }
+ ],
+ "http://www.w3.org/ns/dx/prof/hasRole": [
+ {
+ "@id": "http://www.w3.org/ns/dx/prof/role/specification"
+ }
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeAccess",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
@@ -7597,7 +7568,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:Naa83e8f3fb5e4e9a88398292112d68f3"
+ "@id": "_:N99568e0cd3774d348d85262f04bc3a0b"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -7606,6 +7577,12 @@
}
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept"
+ },
{
"@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
}
@@ -7619,29 +7596,56 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Unauthorised Data Modification"
+ "@value": "Something that acts as or causes Unauthorised Code Access"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Unauthorised Data Modification"
+ "@value": "Unauthorised Code Access"
}
]
},
{
- "@id": "_:Naa83e8f3fb5e4e9a88398292112d68f3",
+ "@id": "_:N99568e0cd3774d348d85262f04bc3a0b",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ENISA Reference Incident Classification Taxonomy 2018"
+ "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
+ "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment"
+ }
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#IntegrityBreach",
+ "@type": [
+ "http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
+ "http://www.w3.org/2002/07/owl#Class"
+ ],
+ "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#"
+ }
+ ],
+ "http://www.w3.org/2000/01/rdf-schema#subClassOf": [
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#DataBreach"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept"
+ }
+ ],
+ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
+ {
+ "@language": "en",
+ "@value": "accepted"
}
]
},
@@ -7676,7 +7680,43 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#Reidentification",
+ "@id": "https://w3id.org/dpv/risk/owl#UserRisks",
+ "@type": [
+ "http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
+ "http://www.w3.org/2002/07/owl#Class"
+ ],
+ "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#"
+ }
+ ],
+ "http://www.w3.org/2000/01/rdf-schema#subClassOf": [
+ {
+ "@id": "https://w3id.org/dpv/owl#RiskConcept"
+ }
+ ],
+ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
+ {
+ "@language": "en",
+ "@value": "accepted"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#definition": [
+ {
+ "@language": "en",
+ "@value": "Concepts associated with risks that arise due to User or Human use"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#prefLabel": [
+ {
+ "@language": "en",
+ "@value": "User Risks"
+ }
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#LoseNegotiatingCapacity",
"@type": [
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv/owl#RiskConcept",
@@ -7690,7 +7730,7 @@
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-19"
+ "@value": "2022-08-17"
}
],
"http://purl.org/dc/terms/modified": [
@@ -7699,6 +7739,11 @@
"@value": "2024-08-16"
}
],
+ "http://purl.org/dc/terms/source": [
+ {
+ "@id": "_:Nf8d97cf300cf44d5881be9535d0b1dff"
+ }
+ ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk/owl#"
@@ -7706,7 +7751,7 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk"
+ "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
@@ -7718,29 +7763,61 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Re-identification"
+ "@value": "Something that acts as or causes Loss of Negotiating Capacity"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Re-identification"
+ "@value": "Lose of Negotiating Capacity"
+ }
+ ]
+ },
+ {
+ "@id": "_:Nf8d97cf300cf44d5881be9535d0b1dff",
+ "@type": [
+ "https://schema.org/WebPage"
+ ],
+ "https://schema.org/name": [
+ {
+ "@value": "ISO/IEC 27005:2018"
}
],
- "http://www.w3.org/2004/02/skos/core#scopeNote": [
+ "https://schema.org/url": [
{
- "@language": "en",
- "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification"
+ "@value": "https://www.iso.org/standard/75281.html"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk/owl#InternalSecurityThreat",
+ "@id": "https://w3id.org/dpv/risk/owl#InterceptCommunications",
"@type": [
- "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv/owl#RiskConcept",
"http://www.w3.org/2002/07/owl#Class"
],
+ "http://purl.org/dc/terms/contributor": [
+ {
+ "@value": "Harshvardhan J. Pandit"
+ }
+ ],
+ "http://purl.org/dc/terms/created": [
+ {
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2022-08-17"
+ }
+ ],
+ "http://purl.org/dc/terms/modified": [
+ {
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2024-08-16"
+ }
+ ],
+ "http://purl.org/dc/terms/source": [
+ {
+ "@id": "_:N1f36b972c50f49fb9b474152b57cf474"
+ }
+ ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk/owl#"
@@ -7748,25 +7825,50 @@
],
"http://www.w3.org/2000/01/rdf-schema#subClassOf": [
{
- "@id": "https://w3id.org/dpv/owl#RiskConcept"
+ "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat"
}
],
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
{
"@language": "en",
- "@value": "accepted"
+ "@value": "modified"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Concepts associated with security threats and issues that originate within the organisation"
+ "@value": "Something that acts as or causes Interception of Communications"
}
],
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Internal Security Threat"
+ "@value": "Intercept Communications"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#scopeNote": [
+ {
+ "@language": "en",
+ "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0"
+ }
+ ]
+ },
+ {
+ "@id": "_:N1f36b972c50f49fb9b474152b57cf474",
+ "@type": [
+ "https://schema.org/WebPage"
+ ],
+ "https://schema.org/name": [
+ {
+ "@value": "ISO/IEC 27005:2018"
+ }
+ ],
+ "https://schema.org/url": [
+ {
+ "@value": "https://www.iso.org/standard/75281.html"
}
]
}
diff --git a/2.1-dev/risk/modules/risk_consequences-owl.n3 b/2.1-dev/risk/modules/risk_consequences-owl.n3
index 100050053..1fdb2d194 100644
--- a/2.1-dev/risk/modules/risk_consequences-owl.n3
+++ b/2.1-dev/risk/modules/risk_consequences-owl.n3
@@ -34,7 +34,9 @@ risk-owl:AuthorisationFailure a rdfs:Class,
schema:name "ENISa Trust Services Security Incidents 2021" ;
schema:url "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:OperationalSecurityRisk ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:IntegrityConcept,
+ risk-owl:OperationalSecurityRisk ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Authorisation Failure"@en ;
skos:prefLabel "Authorisation Failure"@en .
@@ -43,7 +45,8 @@ risk-owl:AvailabilityBreach a rdfs:Class,
owl:Class,
dpv-owl:RiskConcept ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:DataBreach ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:DataBreach ;
sw:term_status "accepted"@en .
risk-owl:Benefit a rdfs:Class,
@@ -68,7 +71,8 @@ risk-owl:Blackmail a rdfs:Class,
schema:name "ISO/IEC 27005:2018" ;
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Blackmail"@en ;
skos:prefLabel "Blackmail"@en .
@@ -83,7 +87,9 @@ risk-owl:BruteForceAuthorisations a rdfs:Class,
schema:name "ENISA Reference Incident Classification Taxonomy 2018" ;
schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat,
+ risk-owl:IntegrityConcept ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ;
skos:prefLabel "Brute Force Authorisations"@en .
@@ -98,7 +104,8 @@ risk-owl:Coercion a rdfs:Class,
schema:name "ENISA Threat Taxonomy 2016" ;
schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Coercion"@en ;
skos:prefLabel "Coercion"@en .
@@ -119,7 +126,8 @@ risk-owl:ComponentFailure a rdfs:Class,
owl:Class,
dpv-owl:RiskConcept ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:OperationalSecurityRisk ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:OperationalSecurityRisk ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Component Failure"@en ;
skos:prefLabel "Component Failure"@en ;
@@ -129,7 +137,8 @@ risk-owl:ComponentMalfunction a rdfs:Class,
owl:Class,
dpv-owl:RiskConcept ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:OperationalSecurityRisk ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:OperationalSecurityRisk ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Component Malfunction"@en ;
skos:prefLabel "Component Malfunction"@en ;
@@ -145,7 +154,10 @@ risk-owl:CompromiseAccount a rdfs:Class,
schema:name "ENISA Reference Incident Classification Taxonomy 2018" ;
schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:OperationalSecurityRisk ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:ConfidentialityConcept,
+ risk-owl:IntegrityConcept,
+ risk-owl:OperationalSecurityRisk ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ;
skos:prefLabel "Compromise Account"@en .
@@ -160,7 +172,8 @@ risk-owl:CompromiseAccountCredentials a rdfs:Class,
schema:name "ENISA Reference Incident Classification Taxonomy 2018" ;
schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:OperationalSecurityRisk ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:OperationalSecurityRisk ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ;
skos:prefLabel "Compromise Account Credentials"@en .
@@ -175,7 +188,8 @@ risk-owl:ConfidentialityBreach a rdfs:Class,
schema:name "ISO/IEC 27005:2018" ;
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:DataBreach ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:DataBreach ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Confidentiality Breach"@en ;
skos:prefLabel "Confidentiality Breach"@en .
@@ -205,7 +219,8 @@ risk-owl:Cryptojacking a rdfs:Class,
schema:name "ENISA Threat Landscape 2021" ;
schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:ExternalSecurityThreat ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Cryptojacking"@en ;
skos:prefLabel "Cryptojacking"@en .
@@ -234,7 +249,10 @@ risk-owl:DataBreach a rdfs:Class,
vann:example dex-owl:E0069,
dex-owl:E0071 ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:SecurityBreach ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:ConfidentialityConcept,
+ risk-owl:IntegrityConcept,
+ risk-owl:SecurityBreach ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Data Breach"@en ;
skos:prefLabel "Data Breach"@en .
@@ -249,7 +267,8 @@ risk-owl:DataCorruption a rdfs:Class,
schema:name "ISO/IEC 27005:2018" ;
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:OperationalSecurityRisk ;
+ rdfs:subClassOf risk-owl:IntegrityConcept,
+ risk-owl:OperationalSecurityRisk ;
sw:term_status "modified"@en ;
skos:definition "Something that acts as or causes Corruption of Data"@en ;
skos:prefLabel "Data Corruption"@en ;
@@ -262,13 +281,11 @@ risk-owl:DenialServiceAttack a rdfs:Class,
dct:created "2022-08-17"^^xsd:date ;
dct:modified "2024-08-16"^^xsd:date ;
dct:source [ a schema:WebPage ;
- schema:name "ISO/IEC 27005:2018" ;
- schema:url "https://www.iso.org/standard/75281.html" ],
- [ a schema:WebPage ;
schema:name "ISO/IEC 27005:2018" ;
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:ExternalSecurityThreat ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ;
skos:prefLabel "Denial of Service Attack (DoS)"@en .
@@ -307,7 +324,8 @@ risk-owl:DistributedDenialServiceAttack a rdfs:Class,
schema:name "ISO/IEC 27005:2018" ;
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:ExternalSecurityThreat ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ;
skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en .
@@ -331,7 +349,8 @@ risk-owl:EquipmentFailure a rdfs:Class,
schema:name "ISO/IEC 27005:2018" ;
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:OperationalSecurityRisk ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:OperationalSecurityRisk ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Equipment Failure"@en ;
skos:prefLabel "Equipment Failure"@en ;
@@ -347,7 +366,8 @@ risk-owl:EquipmentMalfunction a rdfs:Class,
schema:name "ISO/IEC 27005:2018" ;
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:OperationalSecurityRisk ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:OperationalSecurityRisk ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Equipment Malfunction"@en ;
skos:prefLabel "Equipment Malfunction"@en ;
@@ -403,7 +423,8 @@ risk-owl:Extorsion a rdfs:Class,
schema:name "ENISA Threat Taxonomy 2016" ;
schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Extorsion"@en ;
skos:prefLabel "Extorsion"@en .
@@ -455,7 +476,8 @@ risk-owl:Fraud a rdfs:Class,
schema:name "ISO/IEC 27005:2018" ;
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Fraud"@en ;
skos:prefLabel "Fraud"@en .
@@ -498,7 +520,8 @@ risk-owl:IdentityFraud a rdfs:Class,
schema:name "ENISA Threat Taxonomy 2016" ;
schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:OperationalSecurityRisk ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:OperationalSecurityRisk ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Identity Fraud"@en ;
skos:prefLabel "Identity Fraud"@en .
@@ -513,7 +536,8 @@ risk-owl:IdentityTheft a rdfs:Class,
schema:name "ENISA Threat Taxonomy 2016" ;
schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:OperationalSecurityRisk ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:OperationalSecurityRisk ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Identity Theft"@en ;
skos:prefLabel "Identity Theft"@en .
@@ -568,7 +592,8 @@ risk-owl:IntegrityBreach a rdfs:Class,
owl:Class,
dpv-owl:RiskConcept ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:DataBreach ;
+ rdfs:subClassOf risk-owl:DataBreach,
+ risk-owl:IntegrityConcept ;
sw:term_status "accepted"@en .
risk-owl:IntentionalMisuse a rdfs:Class,
@@ -590,21 +615,13 @@ risk-owl:InterceptCommunications a rdfs:Class,
schema:name "ISO/IEC 27005:2018" ;
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat ;
sw:term_status "modified"@en ;
skos:definition "Something that acts as or causes Interception of Communications"@en ;
skos:prefLabel "Intercept Communications"@en ;
skos:scopeNote "This concept was called \"InterceptionCommunications\" in DPV 2.0"@en .
-risk-owl:InternalSecurityThreat a rdfs:Class,
- owl:Class,
- dpv-owl:RiskConcept ;
- rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf dpv-owl:RiskConcept ;
- sw:term_status "accepted"@en ;
- skos:definition "Concepts associated with security threats and issues that originate within the organisation"@en ;
- skos:prefLabel "Internal Security Threat"@en .
-
risk-owl:JudicialCosts a rdfs:Class,
owl:Class,
dpv-owl:RiskConcept ;
@@ -747,7 +764,10 @@ risk-owl:MaliciousCodeAttack a rdfs:Class,
schema:name "ENISA Reference Incident Classification Taxonomy 2018" ;
schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat,
+ risk-owl:IntegrityConcept ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Malicious Code Attack"@en ;
skos:prefLabel "Malicious Code Attack"@en .
@@ -762,7 +782,10 @@ risk-owl:MalwareAttack a rdfs:Class,
schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ;
schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat,
+ risk-owl:IntegrityConcept ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Malware Attack"@en ;
skos:prefLabel "Malware Attack"@en .
@@ -851,7 +874,8 @@ risk-owl:PhishingScam a rdfs:Class,
schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ;
schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Phishing Scam"@en ;
skos:prefLabel "Phishing Scam"@en .
@@ -924,7 +948,8 @@ risk-owl:Reidentification a rdfs:Class,
dct:created "2022-08-19"^^xsd:date ;
dct:modified "2024-08-16"^^xsd:date ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:OperationalSecurityRisk ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:OperationalSecurityRisk ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Re-identification"@en ;
skos:prefLabel "Re-identification"@en ;
@@ -1029,7 +1054,9 @@ risk-owl:Sabotage a rdfs:Class,
schema:name "ENISA Reference Incident Classification Taxonomy 2018" ;
schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:ExternalSecurityThreat,
+ risk-owl:IntegrityConcept ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Sabotage"@en ;
skos:prefLabel "Sabotage"@en .
@@ -1044,7 +1071,8 @@ risk-owl:Scam a rdfs:Class,
schema:name "ISO/IEC 27005:2018" ;
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Scam"@en ;
skos:prefLabel "Scam"@en .
@@ -1053,7 +1081,10 @@ risk-owl:SecurityAttack a rdfs:Class,
owl:Class,
dpv-owl:RiskConcept ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat,
+ risk-owl:IntegrityConcept ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ;
skos:prefLabel "Security Attack"@en .
@@ -1068,7 +1099,10 @@ risk-owl:SecurityBreach a rdfs:Class,
schema:name "ISO/IEC 27005:2018" ;
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:OperationalSecurityRisk ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:ConfidentialityConcept,
+ risk-owl:IntegrityConcept,
+ risk-owl:OperationalSecurityRisk ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Security Breach"@en ;
skos:prefLabel "Security Breach"@en .
@@ -1130,7 +1164,9 @@ risk-owl:Spoofing a rdfs:Class,
schema:name "ISO/IEC 27005:2018" ;
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat,
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat,
+ risk-owl:IntegrityConcept,
risk-owl:OperationalSecurityRisk ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Spoofing"@en ;
@@ -1146,7 +1182,8 @@ risk-owl:SystemFailure a rdfs:Class,
schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ;
schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:OperationalSecurityRisk ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:OperationalSecurityRisk ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes System Failure"@en ;
skos:prefLabel "System Failure"@en ;
@@ -1162,7 +1199,10 @@ risk-owl:SystemIntrusion a rdfs:Class,
schema:name "ENISA Reference Incident Classification Taxonomy 2018" ;
schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat,
+ risk-owl:IntegrityConcept ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes System Intrusion"@en ;
skos:prefLabel "System Intrusion"@en .
@@ -1177,7 +1217,8 @@ risk-owl:SystemMalfunction a rdfs:Class,
schema:name "ISO/IEC 27005:2018" ;
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:OperationalSecurityRisk ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:OperationalSecurityRisk ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes System Malfunction"@en ;
skos:prefLabel "System Malfunction"@en ;
@@ -1208,7 +1249,10 @@ risk-owl:UnauthorisedAccesstoPremises a rdfs:Class,
schema:name "ISO/IEC 27005:2018" ;
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat,
+ risk-owl:IntegrityConcept ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ;
skos:prefLabel "Unauthorised Access to Premises"@en .
@@ -1217,7 +1261,10 @@ risk-owl:UnauthorisedActivity a rdfs:Class,
owl:Class,
dpv-owl:RiskConcept ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat,
+ risk-owl:IntegrityConcept ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Unauthorised Activity"@en ;
skos:prefLabel "Unauthorised Activity"@en .
@@ -1232,7 +1279,9 @@ risk-owl:UnauthorisedCodeAccess a rdfs:Class,
schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ;
schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat,
+ risk-owl:IntegrityConcept ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Unauthorised Code Access"@en ;
skos:prefLabel "Unauthorised Code Access"@en .
@@ -1247,7 +1296,8 @@ risk-owl:UnauthorisedCodeDisclosure a rdfs:Class,
schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ;
schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ;
skos:prefLabel "Unauthorised Code Disclosure"@en .
@@ -1262,7 +1312,8 @@ risk-owl:UnauthorisedCodeModification a rdfs:Class,
schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ;
schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:ExternalSecurityThreat,
+ risk-owl:IntegrityConcept ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ;
skos:prefLabel "Unauthorised Code Modification"@en .
@@ -1277,7 +1328,8 @@ risk-owl:UnauthorisedDataAccess a rdfs:Class,
schema:name "ENISA Reference Incident Classification Taxonomy 2018" ;
schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Unauthorised Data Access"@en ;
skos:prefLabel "Unauthorised Data Access"@en .
@@ -1292,7 +1344,8 @@ risk-owl:UnauthorisedDataDisclosure a rdfs:Class,
schema:name "ISO/IEC 27005:2018" ;
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ;
skos:prefLabel "Unauthorised Data Disclosure"@en .
@@ -1307,7 +1360,8 @@ risk-owl:UnauthorisedDataModification a rdfs:Class,
schema:name "ENISA Reference Incident Classification Taxonomy 2018" ;
schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:ExternalSecurityThreat,
+ risk-owl:IntegrityConcept ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ;
skos:prefLabel "Unauthorised Data Modification"@en .
@@ -1322,7 +1376,8 @@ risk-owl:UnauthorisedInformationDisclosure a rdfs:Class,
schema:name "ENISA Reference Incident Classification Taxonomy 2018" ;
schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ;
skos:prefLabel "Unauthorised Information Disclosure"@en .
@@ -1334,7 +1389,8 @@ risk-owl:UnauthorisedReidentification a rdfs:Class,
dct:created "2022-08-19"^^xsd:date ;
dct:modified "2024-08-16"^^xsd:date ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ;
skos:prefLabel "Unauthorised Re-Identification"@en .
@@ -1349,7 +1405,8 @@ risk-owl:UnauthorisedResourceUse a rdfs:Class,
schema:name "ISO/IEC 27005:2018" ;
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:ExternalSecurityThreat ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ;
skos:prefLabel "Unauthorised Resource Use"@en .
@@ -1364,7 +1421,9 @@ risk-owl:UnauthorisedSystemAccess a rdfs:Class,
schema:name "ISO/IEC 27005:2018" ;
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat,
+ risk-owl:IntegrityConcept ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Unauthorised System Access"@en ;
skos:prefLabel "Unauthorised System Access"@en .
@@ -1379,7 +1438,8 @@ risk-owl:UnauthorisedSystemModification a rdfs:Class,
schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ;
schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:ExternalSecurityThreat,
+ risk-owl:IntegrityConcept ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Unauthorised System Modification"@en ;
skos:prefLabel "Unauthorised System Modification"@en .
@@ -1394,7 +1454,9 @@ risk-owl:UnwantedCodeDeletion a rdfs:Class,
schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ;
schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:ExternalSecurityThreat,
+ risk-owl:IntegrityConcept ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ;
skos:prefLabel "Unwanted Code Deletion"@en .
@@ -1409,7 +1471,9 @@ risk-owl:UnwantedDataDeletion a rdfs:Class,
schema:name "ISO/IEC 27005:2018" ;
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:ExternalSecurityThreat,
+ risk-owl:IntegrityConcept ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ;
skos:prefLabel "Unwanted Data Deletion"@en .
@@ -1424,7 +1488,8 @@ risk-owl:UnwantedDisclosureData a rdfs:Class,
schema:name "ISO/IEC 27005:2018" ;
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ;
skos:prefLabel "Unwanted Disclosure of Data"@en .
@@ -1543,21 +1608,6 @@ risk-owl:ViolenceAgainstChildren a rdfs:Class,
skos:prefLabel "Violence against children"@en ;
skos:scopeNote "This concept was called \"ChildViolence\" in DPV 2.0"@en .
-risk-owl:VulnerabilityCreated a rdfs:Class,
- owl:Class,
- dpv-owl:RiskConcept ;
- dct:contributor "Harshvardhan J. Pandit" ;
- dct:created "2022-08-17"^^xsd:date ;
- dct:modified "2024-08-16"^^xsd:date ;
- dct:source [ a schema:WebPage ;
- schema:name "ISO/IEC 27005:2018" ;
- schema:url "https://www.iso.org/standard/75281.html" ] ;
- rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:InternalSecurityThreat ;
- sw:term_status "accepted"@en ;
- skos:definition "Something that acts as or causes Vulnerability Created"@en ;
- skos:prefLabel "Vulnerability Created"@en .
-
risk-owl:serialisation-html a profile:ResourceDescriptor ;
dct:conformsTo ;
dct:format ;
diff --git a/2.1-dev/risk/modules/risk_consequences-owl.rdf b/2.1-dev/risk/modules/risk_consequences-owl.rdf
index a24cf3b5f..9c7cdd832 100644
--- a/2.1-dev/risk/modules/risk_consequences-owl.rdf
+++ b/2.1-dev/risk/modules/risk_consequences-owl.rdf
@@ -12,1997 +12,2039 @@
xmlns:sw="http://www.w3.org/2003/06/sw-vocab-status/ns#"
xmlns:vann="http://purl.org/vocab/vann/"
>
-
+
+ modified
+ Georg P. Krog, Harshvardhan J. Pandit
- modified
+ Fee
+ DGA 2.10
+ Something that acts as or provides fees e.g. for using a service
2024-08-16
- Something that acts as or causes Violation of Contractual Obligations
-
- This concept was called "ViolationContractualObligations" in DPV 2.0
- Violation of Contractual Obligation
- 2022-08-17
- Harshvardhan J. Pandit
-
+ 2024-04-14
+
-
+
+ accepted
+ 2024-08-16
+ Exposure to Harmful Speech
- Something that acts as or causes Loss of Negotiating Capacity
-
- Harshvardhan J. Pandit
+ This concept was called "HarmfulSpeech" in DPV 2.0
2022-08-17
- accepted
- 2024-08-16
- Lose of Negotiating Capacity
-
+ Harshvardhan J. Pandit
+ Something that acts as or causes Harmful Speech
+
+
-
- Compensation
-
+
- 2024-04-14
- Georg P. Krog, Harshvardhan J. Pandit
+ 2022-08-17
+
+
+ Harshvardhan J. Pandit
+ Something that acts as or causes Physical Assault
accepted
- Something that acts as or provides compensation - which can be monetary and financial or in other forms
2024-08-16
-
+ Physical Assault
+
-
+
+ 2024-08-16
+ Lose of Negotiating Capacity
+
+
+
+ 2022-08-17
-
Harshvardhan J. Pandit
- modified
+ accepted
+ Something that acts as or causes Loss of Negotiating Capacity
+
+
+
+
+ 2022-08-19
+ 2024-08-16
- 2024-08-16
- 2022-08-17
- Something that acts as or causes Corruption of Data
- Data Corruption
- This concept was called "Corruption Data" in DPV 2.0
+
+ Harshvardhan J. Pandit
+ Re-identification
+ Something that acts as or causes Re-identification
+ Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification
+ accepted
+
-
+
+
+
+ Something that acts as or causes an attack on security with the aim of undermining it
+
+ accepted
+ Security Attack
+
+
+
+
+
+
+ Something that acts as or causes Child Violence
+ 2024-08-16
+
- Public Order Breach
-
Harshvardhan J. Pandit
+ Violence against children
accepted
- 2024-08-16
2022-08-17
- Something that acts as or causes Public Order Breach
-
+
+ This concept was called "ChildViolence" in DPV 2.0
+
-
- Harshvardhan J. Pandit
- accepted
+
+ 2024-08-16
- 2024-08-16
2022-08-17
- Something that acts as or causes a compromised account that is then used by the compromiser
- Compromise Account
+ Something that acts as or causes Loss of Goodwill
-
-
+ Harshvardhan J. Pandit
+
+ accepted
+ Lose of Goodwill
+
-
- 2024-08-16
+
accepted
+ Risks and issues that affect the reputation of the organisation
- This concept was called "HarmfulSpeech" in DPV 2.0
- 2022-08-17
- Something that acts as or causes Harmful Speech
- Exposure to Harmful Speech
+ Reputational Risk
- Harshvardhan J. Pandit
-
-
+
-
- https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/
- ENISA Reference Incident Classification Taxonomy 2018
+
+ ISO/IEC 27005:2018
+ https://www.iso.org/standard/75281.html
-
- Violation of Rights
+
+ accepted
+ Something that acts as or causes Component Malfunction
- Georg P. Krog, Harshvardhan J. Pandit
- 2022-08-18
- Something that acts as or causes Violation of Rights
- 2024-08-16
- This concept was called "ViolationOfRights" in DPV 2.0
+ Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of
- accepted
-
+ Component Malfunction
+
+
-
- Security Breach
+
+ Something that acts as or causes Unauthorised Data Disclosure
+ 2024-08-16
- Something that acts as or causes Security Breach
- Harshvardhan J. Pandit
- 2024-08-16
-
accepted
2022-08-17
-
-
+
+
+ Harshvardhan J. Pandit
+ Unauthorised Data Disclosure
+
+
-
+
+ Something that acts as or causes Component Failure
+ Component Failure
accepted
-
+ Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of
+
+
-
- 2022-08-17
- Violating Code of Conduct
-
+
- modified
+ Here equipment refers to physical equipment
+ Something that acts as or causes Equipment Failure
2024-08-16
+ 2022-08-17
+
Harshvardhan J. Pandit
- Something that acts as or causes Violation of Code of Conduct
-
- This concept was called "ViolationCodeConduct" in DPV 2.0
-
+ Equipment Failure
+ accepted
+
+
+
-
-
+
+ Unauthorised Re-Identification
+ Georg P. Krog
+ 2022-08-19
+ 2024-08-16
+
+ Something that acts as or causes Unauthorised Re-Identification
+ accepted
+
+
+
+
Harshvardhan J. Pandit
+
+
+
+ Compromise Account
+ Something that acts as or causes a compromised account that is then used by the compromiser
accepted
- Unwanted Data Deletion
+
2024-08-16
2022-08-17
- Something that acts as or causes Unwanted Data Deletion
-
+
+
+
+
-
- accepted
+
+ 2024-08-16
- 2024-08-16
+ Something that acts as or causes Sabotage
+ Sabotage
2022-08-17
- Unauthorised Code Modification
+
Harshvardhan J. Pandit
-
- Something that acts as or causes Unauthorised Code Modification
+ accepted
+
+
-
-
- Illegal Data Processing
-
-
-
- 2024-08-16
- Something that acts as or causes Illegal Processing of Data
- This concept was called "IllegalProcessingData" in DPV 2.0
+
Harshvardhan J. Pandit
accepted
-
2022-08-17
-
-
-
- https://www.iso.org/standard/75281.html
- ISO/IEC 27005:2018
-
-
-
- 2024-08-16
-
+ Something that acts as or causes Account Credentials to be compromised
+
+ Compromise Account Credentials
+ 2024-08-16
+
- accepted
- The criteria for what is considered material damage is based in jurisdictional laws and norms
- Material Damage
- Harshvardhan J. Pandit
- 2022-03-30
- Something that acts as or causes Material Damage
-
+
+
- 2022-08-17
- Something that acts as or causes Unauthorised Information Disclosure
-
- Unauthorised Information Disclosure
-
+
+ accepted
2024-08-16
-
+ Unauthorised Information Disclosure
+ Something that acts as or causes Unauthorised Information Disclosure
+ 2022-08-17
+
Harshvardhan J. Pandit
- accepted
+
+
-
- Harshvardhan J. Pandit
- Something that acts as or causes System Malfunction
+
accepted
-
+
+ 2024-08-16
+
- 2024-08-16
-
- Here system refers to both hardware and software systems
+ Harshvardhan J. Pandit
+ Psychological Harm
2022-08-17
- System Malfunction
+ Something that acts as or causes Psychological Harm
+
+
+
+
+
+
+ 2024-08-16
+ Authorisation Failure
+ Something that acts as or causes Authorisation Failure
+
+ accepted
+ 2022-08-17
+
+ Harshvardhan J. Pandit
+
+
-
-
- ENISA Reference Incident Classification Taxonomy 2018
+
+
+
+
+ accepted
+ Something that involves or causes judicial penalties to be paid
+
+ Judicial Penalty
+
+
+
https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/
+ ENISA Reference Incident Classification Taxonomy 2018
+
-
+
+ The criteria for what is considered material damage is based in jurisdictional laws and norms
+ 2022-03-30
+ Something that acts as or causes Non-Material Damage
+
+ Harshvardhan J. Pandit
+ accepted
+ 2024-08-16
+ Non-Material Damage
+
+
+
Harshvardhan J. Pandit
+
2022-08-17
-
-
- Something that acts as or causes Spoofing
- Spoofing
+
+
+
+ Something that acts as or causes Unauthorised Code Disclosure
accepted
2024-08-16
+ Unauthorised Code Disclosure
-
+
-
-
+
+ 2024-08-16
+
- 2024-08-16
+ 2022-08-17
Harshvardhan J. Pandit
-
- 2022-08-17
- Violation of Legal Obligations
- Something that acts as or causes Violation of Legal Obligations
- This concept was called "ViolationRegulatoryObligations" in DPV 2.0
- modified
-
+ Malware Attack
+ accepted
+
+ Something that acts as or causes Malware Attack
+
+
+
+
-
+
+ Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques
+ 2024-08-16
- Injury
Harshvardhan J. Pandit
+
+ Brute Force Authorisations
accepted
- Something that acts as or causes Injury
-
- 2024-08-16
2022-08-17
-
-
-
- https://www.iso.org/standard/75281.html
-
- ISO/IEC 27005:2018
-
-
- ENISA Threat Landscape for Ransomware Attacks 2022
-
- https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks
+
+
+
-
- accepted
-
- Something that acts as or causes Account Credentials to be compromised
- Compromise Account Credentials
+
- Harshvardhan J. Pandit
- 2022-08-17
- 2024-08-16
-
-
-
- https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view
-
- ENISA Threat Taxonomy 2016
+ Accidental Misuse
+ accepted
+ Accidental Misuse
+
-
- https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/
- ENISA Reference Incident Classification Taxonomy 2018
+
+ ISO/IEC 27005:2018
+ https://www.iso.org/standard/75281.html
-
-
+
+
- Unauthorised Code Disclosure
+ Unauthorised Access to Premises
+ 2022-08-17
Harshvardhan J. Pandit
- Something that acts as or causes Unauthorised Code Disclosure
- 2024-08-16
- 2022-08-17
-
accepted
+ Something that acts as or causes Unauthorised Access to Premises
+ 2024-08-16
+
+
+
+
-
- 2022-08-17
-
+
+
- Harshvardhan J. Pandit
- 2024-08-16
- Something that acts as or causes Physical Assault
accepted
-
- Physical Assault
-
-
-
-
-
-
+ Something that acts as or causes Unauthorised Data Modification
+ Unauthorised Data Modification
2024-08-16
- Fraud
-
-
- accepted
- Something that acts as or causes Fraud
2022-08-17
+
Harshvardhan J. Pandit
+
-
- ISO/IEC 27005:2018
-
- https://www.iso.org/standard/75281.html
+
+
+
+
+ Risks and issues that affect or have the potential to affect specific individuals
+ accepted
+ Individual Risk
-
+
+ Here equipment refers to physical equipment
+
+ accepted
2022-08-17
- Blackmail
- Harshvardhan J. Pandit
- Something that acts as or causes Blackmail
+ Equipment Malfunction
2024-08-16
-
- accepted
-
+ Harshvardhan J. Pandit
+ Something that acts as or causes Equipment Malfunction
+
+
-
+
accepted
+ 2022-08-17
+ 2024-08-16
+
+ Harshvardhan J. Pandit
+ Something that acts as or causes System Intrusion
+ System Intrusion
- Something that acts as or causes Component Failure
- Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of
- Component Failure
-
+
+
+
+
-
+
+ Financial Loss
+ Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity
+ 2024-08-16
+
+
+
Harshvardhan J. Pandit
accepted
- 2024-08-16
2022-08-17
- Something that acts as or causes Unauthorised Access to Premises
-
- Unauthorised Access to Premises
+
+
+
+
+ ENISA Reference Incident Classification Taxonomy 2018
+
+ https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/
+
+
+ Detriment
-
+ Something that acts as or causes Detriment
+ 2022-03-23
+ Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves
+ 2024-08-16
+ accepted
+
+
+
+
+
+
+
+ Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres
+
+ Something that acts as or causes benefits
+ 2022-03-23
+ accepted
+ Benefit
+ 2024-08-16
+
+
+
+ ISO/IEC 27005:2018
+
+ https://www.iso.org/standard/75281.html
- Delaram Golpayegani
+ 2024-06-11
+ accepted
+ Misuse
+
Something that acts as or causes Misuse
2024-08-16
+ Delaram Golpayegani
+
+
+
+ 2024-08-16
+ Limitation of Rights
+
+
+
- Misuse
+ 2022-08-18
+ This concept was called "LimitationOfRights" in DPV 2.0
accepted
- 2024-06-11
-
+ Something that acts as or causes Limitation of Rights
+ Georg P. Krog, Harshvardhan J. Pandit
+
-
-
- Axel Polleres
- Julian Flake
- Fajar Ekaputra
- Beatriz Esteves
- Delaram Golpayegani
- Georg P. Krog
+
+ Something that acts as or causes Denial of Service Attack (DoS)
+
Harshvardhan J. Pandit
- Delaram Golpayegani
- Beatriz Esteves
- Julian Flake
- Rob Brennan
- Harshvardhan J. Pandit
- Paul Ryan
- Georg P. Krog
- https://w3id.org/dpv/risk
- 2.1-dev
- https://w3id.org/dpv/risk#
-
-
-
-
- 2024-07-13
- 2022-08-14
- Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management
-
-
-
-
-
-
-
-
- 2.1-dev
- 10.5281/zenodo.12505841
-
- http://www.w3.org/2004/02/skos/core
-
- http://www.w3.org/2000/01/rdf-schema
- Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426
-
-
-
- 2022-08-14
- http://purl.org/ontology/bibo/status/published
- RISK
- Risk Concepts
-
-
- risk
-
-
+ Denial of Service Attack (DoS)
+ accepted
+ 2022-08-17
+ 2024-08-16
- 2024-04-14
- Georg P. Krog, Harshvardhan J. Pandit
- Fee
- DGA 2.10
- Something that acts as or provides fees e.g. for using a service
- modified
+
+
+
+
+
+ accepted
+ 2022-08-17
2024-08-16
+
+
+
+
+ Something that acts as or causes Malicious Code Attack
-
+ Harshvardhan J. Pandit
+ Malicious Code Attack
+
+
+
+
-
- Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves
+
-
- Detriment
- accepted
+ Something that acts as or causes Scam
2024-08-16
- 2022-03-23
- Something that acts as or causes Detriment
-
-
-
-
+
2022-08-17
- Something that acts as or causes Loss of Customer Confidence
- Lose of Customer Confidence
-
-
-
Harshvardhan J. Pandit
- 2024-08-16
accepted
-
+ Scam
+
+
-
+
+ ENISa Trust Services Security Incidents 2021
+
+ https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021
+
+
+ Harshvardhan J. Pandit
+ accepted
+ 2022-08-17
- Something that acts as or causes Identity Theft
-
- Harshvardhan J. Pandit
- Identity Theft
- accepted
+ Something that acts as or causes Security Breach
+
+ Security Breach
2024-08-16
- 2022-08-17
+
+
+
-
-
+
+
- Violence against children
- Harshvardhan J. Pandit
- Something that acts as or causes Child Violence
- 2024-08-16
- 2022-08-17
- This concept was called "ChildViolence" in DPV 2.0
-
+ Something that acts as or causes Social Disadvantage
accepted
-
+ 2024-08-16
+ Georg P. Krog
+ Social Disadvantage
+ 2022-08-19
+
-
+
- ISO/IEC 27005:2018
- https://www.iso.org/standard/75281.html
+ https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment
+ ENISA Methodology for Sectoral Cybersecurity Assessments
-
- Accidental Misuse
- Accidental Misuse
+
-
- accepted
-
-
-
- Something that acts as or causes Data Breach
accepted
-
-
-
-
-
- 2024-08-16
- 2022-08-17
- Data Breach
- Harshvardhan J. Pandit
-
+ Intentional Misuse
+ Intentional Misuse
-
+
-
+
+ Unwanted Code Deletion
- Something that acts as or causes Terrorism
-
-
-
Harshvardhan J. Pandit
- 2024-08-16
-
- Terrorism
- accepted
- 2022-08-17
-
-
-
- Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques
- Harshvardhan J. Pandit
- 2022-08-17
accepted
- Brute Force Authorisations
+ Something that acts as or causes Unwanted Code Deletion
+
+ 2022-08-17
2024-08-16
-
-
+
+
-
-
-
-
-
- Something that acts as or causes Component Malfunction
- Component Malfunction
- Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of
- accepted
-
+
+ ENISA Reference Incident Classification Taxonomy 2018
+ https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/
+
-
- Unauthorised System Modification
- Harshvardhan J. Pandit
- accepted
-
-
-
-
+
2024-08-16
+ This concept was called "ViolationEthicalCode" in DPV 2.0
2022-08-17
- Something that acts as or causes Unauthorised System Modification
-
-
-
+ Harshvardhan J. Pandit
- accepted
-
-
+
+ Something that acts as or causes Violation of Ethics Code
+ Violating Ethics Code
+ modified
+
-
+
+
Harshvardhan J. Pandit
- accepted
+ Unwanted Disclosure of Data
+ 2022-08-17
+ Something that acts as or causes Unwanted Disclosure of Data
+ accepted
+
2024-08-16
- 2022-08-17
-
- Here system refers to both hardware and software systems
- Something that acts as or causes System Failure
- System Failure
-
-
+
+
-
+
+ accepted
2024-08-16
- 2022-08-17
-
+
- Harshvardhan J. Pandit
- Sexual Violence
- accepted
-
- Something that acts as or causes Sexual Violence
-
-
-
- https://www.iso.org/standard/75281.html
-
- ISO/IEC 27005:2018
+ 2024-04-14
+ Something that acts as or provides renumeration which is in monetary or financial form
+ Georg P. Krog, Harshvardhan J. Pandit
+ Remuneration
+
-
+
+ Something that acts as or causes Distributed Denial of Service Attack (DDoS)
2024-08-16
- 2022-08-17
-
+
-
- Phishing Scam
- Something that acts as or causes Phishing Scam
Harshvardhan J. Pandit
+ Distributed Denial of Service Attack (DDoS)
accepted
+ 2022-08-17
+
+
-
- https://www.iso.org/standard/75281.html
+
ISO/IEC 27005:2018
+ https://www.iso.org/standard/75281.html
-
-
+
+ 2024-08-16
+ Terrorism
+
- This concept was called "PreventExercisingOfRights" in DPV 2.0
- Something that acts as or causes Prevent Exercising of Rights
- Georg P. Krog, Harshvardhan J. Pandit
- 2022-08-18
- 2024-08-16
- Prevent Exercising of Rights
+ Harshvardhan J. Pandit
accepted
+ 2022-08-17
+ Something that acts as or causes Terrorism
+
-
- Something that acts as or causes Erroneous System Use
- 2022-08-17
- Erroneous System Use
-
-
-
- Harshvardhan J. Pandit
- 2024-08-16
-
-
- accepted
-
+
+
+
+
+
+ Risk Concepts - RDF/XML serialiation
+
-
- modified
- Something that acts as or causes Violation of Ethics Code
+
+ ISO/IEC 27005:2018
+
+ https://www.iso.org/standard/75281.html
+
+
- 2024-08-16
+ Unauthorised Code Modification
+ Something that acts as or causes Unauthorised Code Modification
+
2022-08-17
- Violating Ethics Code
-
- This concept was called "ViolationEthicalCode" in DPV 2.0
Harshvardhan J. Pandit
-
-
-
-
- Something that acts as or causes Distributed Denial of Service Attack (DDoS)
accepted
- 2022-08-17
- Distributed Denial of Service Attack (DDoS)
-
-
-
-
- Harshvardhan J. Pandit
2024-08-16
+
-
+
+ 2022-08-17
+ accepted
- Something that acts as or causes Psychological Harm
-
- Harshvardhan J. Pandit
- Psychological Harm
- accepted
+
2024-08-16
- 2022-08-17
-
-
-
-
+ Something that acts as or causes Identity Theft
+ Identity Theft
-
-
-
-
- Lose of Trust
Harshvardhan J. Pandit
- 2022-08-17
- accepted
- 2024-08-16
- Something that acts as or causes Loss of Trust
-
+
+
-
- 2024-08-16
- Something that acts as or causes Malicious Code Attack
-
- accepted
+
+ 2024-08-16
+
+
Harshvardhan J. Pandit
+ Intercept Communications
+ This concept was called "InterceptionCommunications" in DPV 2.0
2022-08-17
- Malicious Code Attack
-
+ Something that acts as or causes Interception of Communications
+ modified
+
-
- https://www.iso.org/standard/75281.html
-
+
ISO/IEC 27005:2018
+
+ https://www.iso.org/standard/75281.html
-
+
+ 2022-08-17
+ This concept was called "ViolationCodeConduct" in DPV 2.0
+ Violating Code of Conduct
+ Something that acts as or causes Violation of Code of Conduct
+
2024-08-16
- 2022-08-17
- Something that acts as or causes Violation of Statutory Obligations
- Violation of Statutory Obligations
-
- Harshvardhan J. Pandit
- This concept was called "ViolationStatutoryObligations" in DPV 2.0
modified
+ Harshvardhan J. Pandit
-
-
- Harshvardhan J. Pandit
-
- accepted
- 2024-08-16
- Lose of Goodwill
-
+
+ modified
+
+ Violation of Legal Obligations
+ Something that acts as or causes Violation of Legal Obligations
+ 2024-08-16
2022-08-17
- Something that acts as or causes Loss of Goodwill
-
+
+
+ Harshvardhan J. Pandit
+ This concept was called "ViolationRegulatoryObligations" in DPV 2.0
+
-
- https://www.iso.org/standard/75281.html
+
ISO/IEC 27005:2018
+ https://www.iso.org/standard/75281.html
-
- 2022-08-17
-
+
+ 2024-08-16
+
- Something that acts as or causes Personal Safety Endangerment
Harshvardhan J. Pandit
- Personal Safety Endangerment
- 2024-08-16
-
+ Lose of Credibility
+
+ Something that acts as or causes Loss of Credibility
accepted
-
+ 2022-08-17
+
-
- accepted
+
- Harshvardhan J. Pandit
2022-08-17
- Something that acts as or causes Vulnerability Created
-
+ Harshvardhan J. Pandit
+ Something that acts as or causes Loss of Reputation
+ accepted
+ Lose of Reputation
+
2024-08-16
- Vulnerability Created
-
+
-
- Something that acts as or causes Confidentiality Breach
- Confidentiality Breach
-
+
+
- 2024-08-16
-
- 2022-08-17
- Harshvardhan J. Pandit
accepted
+
-
+
+ 2024-08-16
- Privacy
- accepted
+ Payment
-
-
-
- Something that acts as or causes Malware Attack
+ 2024-04-14
accepted
+ Something that acts as or provides payment e.g. to access a service or purchase resources
+ Georg P. Krog, Harshvardhan J. Pandit
+
+
+
- Harshvardhan J. Pandit
- 2024-08-16
+ Lose of Trust
+ Something that acts as or causes Loss of Trust
2022-08-17
-
- Malware Attack
-
-
-
- https://www.iso.org/standard/75281.html
- ISO/IEC 27005:2018
-
-
-
accepted
-
-
-
-
- Internal Security Threat
- Concepts associated with security threats and issues that originate within the organisation
-
-
-
- ENISA Methodology for Sectoral Cybersecurity Assessments
-
- https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment
+ 2024-08-16
+ Harshvardhan J. Pandit
+
+
-
-
+
+
- Harshvardhan J. Pandit
- 2024-08-16
- Something that acts as or causes Human Errors
+ Harshvardhan J. Pandit
+
+
accepted
- Human Errors
+ Something that acts as or causes Data Breach
2022-08-17
-
-
-
- ENISA Threat Taxonomy 2016
-
- https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view
+ 2024-08-16
+ Data Breach
+
+
+
+
-
-
- Lose of Reputation
-
-
-
-
- Harshvardhan J. Pandit
- 2022-08-17
+
+ Something that acts as or causes Sexual Violence
accepted
2024-08-16
- Something that acts as or causes Loss of Reputation
-
-
-
-
- Lose of Opportunity
-
+
+
- Something that acts as or causes Loss of Opportunity
+ Sexual Violence
Harshvardhan J. Pandit
- 2024-08-16
- accepted
2022-08-17
-
+
-
-
+
+ Here system refers to both hardware and software systems
+
+ 2024-08-16
+
- Something that acts as or causes Unauthorised Resource Use
+ 2022-08-17
- Unauthorised Resource Use
Harshvardhan J. Pandit
- 2024-08-16
- 2022-08-17
-
+ System Failure
accepted
-
+ Something that acts as or causes System Failure
+
+
-
- Risks and issues that affect or have the potential to affect specific individuals
- Individual Risk
- accepted
+
+ ISO/IEC 27005:2018
+ https://www.iso.org/standard/75281.html
+
+
+
+
+
+ Something that acts as or causes Violation of Statutory Obligations
+ modified
+ This concept was called "ViolationStatutoryObligations" in DPV 2.0
+ 2024-08-16
+ 2022-08-17
+ Violation of Statutory Obligations
+ Harshvardhan J. Pandit
+
-
+
2022-08-17
- Something that acts as or causes Unauthorised Data Modification
- Unauthorised Data Modification
-
+
+
- Harshvardhan J. Pandit
+ accepted
2024-08-16
+ Spoofing
- accepted
+ Harshvardhan J. Pandit
+ Something that acts as or causes Spoofing
+
+
+
-
- Guides for Data Privacy Vocabulary
-
-
-
-
-
-
-
+
- Societal Health & Safety
accepted
+
+ Identity Fraud
+ Something that acts as or causes Identity Fraud
+ 2024-08-16
+ 2022-08-17
-
-
-
- Examples for Data Privacy Vocabulary
-
-
-
-
-
+ Harshvardhan J. Pandit
+
+
-
+
+
+ 2024-08-16
+ 2022-08-17
+
+ Harshvardhan J. Pandit
+ Violation of Contractual Obligation
+
+
+ This concept was called "ViolationContractualObligations" in DPV 2.0
+ modified
+ Something that acts as or causes Violation of Contractual Obligations
+
+
+
+ ENISA Methodology for Sectoral Cybersecurity Assessments
+
+ https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment
+
+
+
+ ISO/IEC 27005:2018
+ https://www.iso.org/standard/75281.html
+
+
+ 2024-08-16
+ Something that acts as or causes Human Errors
+
+ Harshvardhan J. Pandit
accepted
- Risks and issues that affect or have the potential to affect society at large or specific groups in society
- Societal Risk
-
+ 2022-08-17
+ Human Errors
+
+
-
- accepted
- Something that acts as or causes Impact to Rights
+
+
+ Julian Flake
+ Fajar Ekaputra
Harshvardhan J. Pandit
- 2022-08-17
+ Beatriz Esteves
+ Axel Polleres
+ Georg P. Krog
+ Delaram Golpayegani
+ Paul Ryan
+ Georg P. Krog
+ Delaram Golpayegani
+ Harshvardhan J. Pandit
+ Beatriz Esteves
+ Rob Brennan
+ Julian Flake
+ http://www.w3.org/2004/02/skos/core
+
+ http://www.w3.org/2000/01/rdf-schema
+
+
+
+ 10.5281/zenodo.12505841
+
+
+
+
+
+
+
+
+
+
+
+
+ Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426
+ http://purl.org/ontology/bibo/status/published
+ 2022-08-14
+ https://w3id.org/dpv/risk
+ Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management
+ 2.1-dev
+
+ 2022-08-14
+
+
+ RISK
+ risk
+ 2.1-dev
+ 2024-07-13
+ Risk Concepts
+ https://w3id.org/dpv/risk#
+
+
+ https://www.iso.org/standard/75281.html
+
+ ISO/IEC 27005:2018
+
+
+
+ ENISA Threat Taxonomy 2016
+ https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view
+
+
+
+ ISO/IEC 27005:2018
+ https://www.iso.org/standard/75281.html
+
+
+ Damage
+ Something that acts as or causes Damage
+ accepted
+ 2022-03-30
- Impact to Rights
- This concept was called "ImpactToRights" in DPV 2.0
-
-
2024-08-16
-
-
+
+ Harshvardhan J. Pandit
+
-
-
+
+ 2024-08-16
+
- Something that acts as or causes Social Disadvantage
- Social Disadvantage
- 2022-08-19
-
+ Harshvardhan J. Pandit
+
accepted
- Georg P. Krog
- 2024-08-16
-
+ 2022-08-17
+
+ Unwanted Data Deletion
+ Something that acts as or causes Unwanted Data Deletion
+
+
+
-
+
-
- accepted
- Authorisation Failure
- Harshvardhan J. Pandit
- 2024-08-16
+ Something that acts as or causes Phishing Scam
+
+ accepted
2022-08-17
- Something that acts as or causes Authorisation Failure
-
+ 2024-08-16
+ Phishing Scam
+ Harshvardhan J. Pandit
+
+
-
-
-
+
+
+ Harshvardhan J. Pandit
+ 2022-08-17
+ Cryptojacking
+
+ Something that acts as or causes Cryptojacking
accepted
2024-08-16
- Something that acts as or causes Identity Fraud
- Harshvardhan J. Pandit
- Identity Fraud
+
+
+
+
+ Something that acts as or causes Injury
+ accepted
2022-08-17
-
+
+ Harshvardhan J. Pandit
+
+
+
+
+ Injury
+ 2024-08-16
+
-
- ENISA Reference Incident Classification Taxonomy 2018
- https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/
+
+ https://www.iso.org/standard/75281.html
+ ISO/IEC 27005:2018
-
-
-
-
- Primer for Data Privacy Vocabulary
-
-
-
-
- Things that cause or have the potential to impact financial resources
+
+ accepted
+ 2022-08-17
+
+
+
+ Unauthorised System Access
+ 2024-08-16
+
+ Harshvardhan J. Pandit
+ Something that acts as or causes Unauthorised System Access
+
+
+
+
+
+
+ Blackmail
+ Harshvardhan J. Pandit
accepted
- Financial Impact
-
+ 2022-08-17
+ Something that acts as or causes Blackmail
+
+ 2024-08-16
+
+
-
-
+
+ Something that acts as or causes Unauthorised Code Access
+
+
2024-08-16
2022-08-17
- Financial Loss
-
Harshvardhan J. Pandit
- Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity
accepted
+ Unauthorised Code Access
+
+
+
+
+
+ accepted
+
+ 2024-04-14
+
+
+
+ Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee
+ Reward
+ 2024-08-16
+ Georg P. Krog, Harshvardhan J. Pandit
-
+ Environmental Risk
+
Risks and issues that have their origin in environment or can affect the environment at large
accepted
- Environmental Risk
-
- Harshvardhan J. Pandit
- accepted
+
+ Copyright Violation
+ Something that acts as or causes Copyright Violation
- Re-identification
+ accepted
+ 2022-08-17
+
+ Harshvardhan J. Pandit
+
2024-08-16
- Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification
- 2022-08-19
+
+
+
+
+
+
+ Something that involves or causes judicial costs to be paid
- Something that acts as or causes Re-identification
-
+ Judicial Costs
+ accepted
+
-
- Coercion
+
+ Unauthorised System Modification
+
-
+ Something that acts as or causes Unauthorised System Modification
+ 2024-08-16
+
Harshvardhan J. Pandit
accepted
- Something that acts as or causes Coercion
- 2024-08-16
2022-08-17
-
+
-
+
ISO/IEC 27005:2018
https://www.iso.org/standard/75281.html
-
+
- Cryptojacking
- Harshvardhan J. Pandit
- Something that acts as or causes Cryptojacking
-
+ Georg P. Krog, Harshvardhan J. Pandit
+ Violation of Rights
+ 2022-08-18
+ This concept was called "ViolationOfRights" in DPV 2.0
+ Something that acts as or causes Violation of Rights
accepted
2024-08-16
+
+
+
+
+
+
+ Unauthorised Data Access
+ Something that acts as or causes Unauthorised Data Access
+ 2024-08-16
+
+
+ Harshvardhan J. Pandit
+ accepted
2022-08-17
+
-
- ENISA Reference Incident Classification Taxonomy 2018
-
- https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/
+
+
+
+
+ accepted
+ Concepts associated with security threats that are likely to originate externally
+
+ External Security Threat
+
-
+
https://www.iso.org/standard/75281.html
ISO/IEC 27005:2018
-
- Equipment Failure
+
+ https://www.iso.org/standard/75281.html
+
+ ISO/IEC 27005:2018
+
+
+ Individual Health & Safety
-
-
- Harshvardhan J. Pandit
- Here equipment refers to physical equipment
- 2024-08-16
- 2022-08-17
accepted
- Something that acts as or causes Equipment Failure
-
+
+
-
- 2022-08-17
-
-
+
+ Something that acts as or causes Fraud
+ accepted
+ 2024-08-16
- Harshvardhan J. Pandit
- Denial of Service Attack (DoS)
- Something that acts as or causes Denial of Service Attack (DoS)
- 2024-08-16
- accepted
+ Harshvardhan J. Pandit
+ Fraud
+
+ 2022-08-17
+
-
- ISO/IEC 27005:2018
- https://www.iso.org/standard/75281.html
-
-
-
+
Harshvardhan J. Pandit
-
+
+ Public Order Breach
+
+
- 2022-03-30
- Non-Material Damage
-
- Something that acts as or causes Non-Material Damage
- 2024-08-16
- The criteria for what is considered material damage is based in jurisdictional laws and norms
accepted
+ Something that acts as or causes Public Order Breach
+ 2022-08-17
+ 2024-08-16
-
-
- Something that acts as or causes benefits
+
+ https://www.iso.org/standard/75281.html
+ ISO/IEC 27005:2018
+
+
+
- Benefit
+
+ Something that acts as or causes Illegal Processing of Data
+ Illegal Data Processing
2024-08-16
- 2022-03-23
accepted
- Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres
-
+ 2022-08-17
+
+ Harshvardhan J. Pandit
+ This concept was called "IllegalProcessingData" in DPV 2.0
+
-
- Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee
+
+
+ ISO/IEC 27005:2018
+ https://www.iso.org/standard/75281.html
+
+
+ accepted
+ Risks and issues that have their basis in legal requirements and enforcement
- 2024-08-16
+ Legal Risk
- accepted
- Reward
- 2024-04-14
- Georg P. Krog, Harshvardhan J. Pandit
-
+
-
- ENISA Threat Landscape 2021
- https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021
+
+ https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/
+ ENISA Reference Incident Classification Taxonomy 2018
-
- Judicial Costs
-
-
-
-
- accepted
- Something that involves or causes judicial costs to be paid
-
+
+ https://www.iso.org/standard/75281.html
+
+ ISO/IEC 27005:2018
-
- Georg P. Krog, Harshvardhan J. Pandit
- Something that acts as or provides payment e.g. to access a service or purchase resources
+
accepted
+ 2022-08-17
+ 2024-08-16
- 2024-08-16
- 2024-04-14
- Payment
-
+ Harshvardhan J. Pandit
+
+ Personal Safety Endangerment
+ Something that acts as or causes Personal Safety Endangerment
+
-
- Concepts associated with security threats that are likely to originate externally
+
+ https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment
+ ENISA Methodology for Sectoral Cybersecurity Assessments
+
+
+
+ ENISA Threat Taxonomy 2016
+ https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view
+
+
+
+
+ ENISA Threat Taxonomy 2016
+ https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view
+
+
+ https://www.iso.org/standard/75281.html
+
+ ISO/IEC 27005:2018
+
+
accepted
-
+
+ Something that acts as or causes violation of policy which can be either internal or external policy
- External Security Threat
-
+ Violating Policy
+
-
+
- 2024-04-14
-
- Something that acts as or provides renumeration which is in monetary or financial form
- 2024-08-16
- Georg P. Krog, Harshvardhan J. Pandit
accepted
- Remuneration
-
+ Risks and issues that affect or have the potential to affect society at large or specific groups in society
+ Societal Risk
+
+
-
-
+
+ accepted
+ 2024-08-16
+
- Security Attack
- Something that acts as or causes an attack on security with the aim of undermining it
- accepted
+ Harshvardhan J. Pandit
+
+ 2022-08-17
+ Something that acts as or causes Extorsion
+ Extorsion
+
-
-
-
-
-
- Risk Concepts - JSON-LD serialiation
-
-
-
-
+
+
- 2024-08-16
- 2022-08-17
- Something that acts as or causes Unwanted Disclosure of Data
- Unwanted Disclosure of Data
- Harshvardhan J. Pandit
-
accepted
-
-
-
- https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment
- ENISA Methodology for Sectoral Cybersecurity Assessments
-
-
-
-
- https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/
- ENISA Reference Incident Classification Taxonomy 2018
+
+
-
-
+
+ Impact to Rights
+
- 2024-08-16
+ accepted
2022-08-17
- accepted
- Something that acts as or causes Loss of Credibility
-
- Lose of Credibility
Harshvardhan J. Pandit
-
+ This concept was called "ImpactToRights" in DPV 2.0
+ Something that acts as or causes Impact to Rights
+
+ 2024-08-16
+
+
-
- This concept was called "InterceptionCommunications" in DPV 2.0
-
- Harshvardhan J. Pandit
- Something that acts as or causes Interception of Communications
+
2022-08-17
-
+ 2024-08-16
+ modified
+ This concept was called "Corruption Data" in DPV 2.0
- modified
- Intercept Communications
- 2024-08-16
-
+ Data Corruption
+
+ Something that acts as or causes Corruption of Data
+ Harshvardhan J. Pandit
+
+
+
-
- 2024-08-16
-
+
+
- 2022-08-17
-
- Something that acts as or causes Unwanted Code Deletion
- Unwanted Code Deletion
- Harshvardhan J. Pandit
+ Privacy
accepted
-
+
-
-
+
+ The criteria for what is considered material damage is based in jurisdictional laws and norms
+ Something that acts as or causes Material Damage
accepted
+ 2024-08-16
- Concepts associated with risks that arise due to User or Human use
- User Risks
-
-
-
- ISO/IEC 27005:2018
- https://www.iso.org/standard/75281.html
-
-
-
+ 2022-03-30
+ Material Damage
+ Harshvardhan J. Pandit
+
+
+
+ Harm
+ This concept refers to the general abstract notion of harm
+ Something that acts as or causes Harm to humans
+ 2024-08-16
+
+ Harshvardhan J. Pandit
+ 2022-08-13
accepted
- Judicial Penalty
- Something that involves or causes judicial penalties to be paid
-
+
-
-
+
+
+ https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/
+ ENISA Reference Incident Classification Taxonomy 2018
+
+
+ Something that acts as or causes Erroneous System Use
+ accepted
+ 2022-08-17
+ 2024-08-16
+
- 2024-08-16
- 2022-08-17
-
- Something that acts as or causes Extorsion
Harshvardhan J. Pandit
- accepted
- Extorsion
-
+
+ Erroneous System Use
+
-
- 2022-08-13
- Harshvardhan J. Pandit
+
+ ISO/IEC 27005:2018
+ https://www.iso.org/standard/75281.html
+
+
+
accepted
+ Something that acts as or causes Loss of Opportunity
+ 2024-08-16
- Something that acts as or causes Harm to humans
- 2024-08-16
- Harm
- This concept refers to the general abstract notion of harm
-
+ Harshvardhan J. Pandit
+ Lose of Opportunity
+
+ 2022-08-17
+
-
+
+
+ ISO/IEC 27005:2018
+ https://www.iso.org/standard/75281.html
+
+
- Something that acts as or causes Discrimination
- accepted
- Georg P. Krog
- 2024-08-16
- 2022-08-19
- Discrimination
+ Societal Health & Safety
+ accepted
-
+
- Something that acts as or causes violation of policy which can be either internal or external policy
-
+ Georg P. Krog, Harshvardhan J. Pandit
accepted
- Violating Policy
-
+ This concept was called "PreventExercisingOfRights" in DPV 2.0
+ 2024-08-16
+
+ Something that acts as or causes Prevent Exercising of Rights
+ 2022-08-18
+ Prevent Exercising of Rights
+
-
- ENISA Methodology for Sectoral Cybersecurity Assessments
- https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment
+
-
-
- https://www.iso.org/standard/75281.html
ISO/IEC 27005:2018
+ https://www.iso.org/standard/75281.html
+
+
+ https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/
+ ENISA Reference Incident Classification Taxonomy 2018
-
- Harshvardhan J. Pandit
+
+
+
+
+
+ accepted
+ Operational Security Risk
+ Risks and issues that arise during operational processes
+
+
+
- Something that acts as or causes Scam
2024-08-16
+ Something that acts as or causes Coercion
+
+ Coercion
+
+ Harshvardhan J. Pandit
accepted
2022-08-17
- Scam
-
-
+
-
+
+
https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/
ENISA Reference Incident Classification Taxonomy 2018
-
-
-
-
- https://www.iso.org/standard/75281.html
- ISO/IEC 27005:2018
-
- https://www.iso.org/standard/75281.html
+
ISO/IEC 27005:2018
+ https://www.iso.org/standard/75281.html
-
-
+
https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/
ENISA Reference Incident Classification Taxonomy 2018
+
-
- Something that acts as or causes Equipment Malfunction
- Equipment Malfunction
+
- Here equipment refers to physical equipment
-
-
- Harshvardhan J. Pandit
- accepted
- 2024-08-16
- 2022-08-17
-
-
-
- Harshvardhan J. Pandit
- Damage
+ Compensation
+ Something that acts as or provides compensation - which can be monetary and financial or in other forms
accepted
-
-
-
2024-08-16
+ Georg P. Krog, Harshvardhan J. Pandit
- 2022-03-30
- Something that acts as or causes Damage
-
+ 2024-04-14
+
-
- Harshvardhan J. Pandit
-
- accepted
- 2022-08-17
-
-
-
-
- Something that acts as or causes Copyright Violation
- 2024-08-16
- Copyright Violation
-
+
+
+
+
+
+
+ Risk Concepts - JSON-LD serialiation
-
-
+
-
- Unauthorised Re-Identification
- 2022-08-19
- Something that acts as or causes Unauthorised Re-Identification
-
- Georg P. Krog
- 2024-08-16
- accepted
-
-
-
- Something that acts as or causes Unauthorised Data Disclosure
- Harshvardhan J. Pandit
- Unauthorised Data Disclosure
-
-
- 2024-08-16
-
+ Unauthorised Resource Use
accepted
+ Something that acts as or causes Unauthorised Resource Use
+
+ 2024-08-16
2022-08-17
+
+ Harshvardhan J. Pandit
+
-
+
- Physical Harm
-
- accepted
-
-
-
+ Something that acts as or causes Loss of Customer Confidence
+ Lose of Customer Confidence
2024-08-16
+
2022-08-17
-
-
-
-
- Something that acts as or causes Unauthorised System Access
- Unauthorised System Access
Harshvardhan J. Pandit
accepted
-
-
-
-
- https://www.iso.org/standard/75281.html
- ISO/IEC 27005:2018
-
-
- https://www.iso.org/standard/75281.html
-
- ISO/IEC 27005:2018
+
-
-
- https://www.iso.org/standard/75281.html
+
ISO/IEC 27005:2018
-
-
- https://www.iso.org/standard/75281.html
- ISO/IEC 27005:2018
-
-
-
- Risk Concepts - Turtle serialiation
-
-
-
-
-
-
-
-
-
-
- Individual Health & Safety
- accepted
-
-
-
- ISO/IEC 27005:2018
https://www.iso.org/standard/75281.html
-
-
- Legal Risk
- accepted
+
+ accepted
- Risks and issues that have their basis in legal requirements and enforcement
+ Financial Impact
+ Things that cause or have the potential to impact financial resources
-
-
-
-
- Sabotage
-
- Something that acts as or causes Sabotage
- 2024-08-16
- Harshvardhan J. Pandit
+
+
accepted
-
2022-08-17
-
-
-
- accepted
+ 2024-08-16
- Harshvardhan J. Pandit
- 2022-08-17
+ Something that acts as or causes Confidentiality Breach
+ Confidentiality Breach
-
- 2024-08-16
- Something that acts as or causes Unauthorised Code Access
- Unauthorised Code Access
-
+ Harshvardhan J. Pandit
+
+
+
+
+
+ ENISA Reference Incident Classification Taxonomy 2018
+ https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/
+
+
+
+ ISO/IEC 27005:2018
+ https://www.iso.org/standard/75281.html
-
-
+
+
+ Here system refers to both hardware and software systems
accepted
- Reputational Risk
+ 2024-08-16
+ System Malfunction
+
+ 2022-08-17
- Risks and issues that affect the reputation of the organisation
-
+ Harshvardhan J. Pandit
+ Something that acts as or causes System Malfunction
+
+
-
+
https://www.iso.org/standard/75281.html
- ISO/IEC 27005:2018
+ ISO/IEC 27005:2018
-
- accepted
-
-
-
- Risks and issues that arise during operational processes
-
- Operational Security Risk
-
+
+ Risk Concepts - Turtle serialiation
+
+
+
+
+
-
+
+ Primer for Data Privacy Vocabulary
+
+
+
+
+
+
+
ISO/IEC 27005:2018
https://www.iso.org/standard/75281.html
-
-
+
+ Something that acts as or causes Discrimination
+ 2022-08-19
+
-
2024-08-16
- System Intrusion
- Something that acts as or causes System Intrusion
- accepted
- Harshvardhan J. Pandit
- 2022-08-17
-
+ accepted
+ Discrimination
+ Georg P. Krog
+
-
-
-
- Risk Concepts - N3 serialiation
-
-
-
+
+
+ https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/
+ ENISA Reference Incident Classification Taxonomy 2018
+
+
+ https://www.iso.org/standard/75281.html
+
+ ISO/IEC 27005:2018
Unauthorised Activity
+ accepted
Something that acts as or causes Unauthorised Activity
- accepted
+
+
+
-
- https://www.iso.org/standard/75281.html
- ISO/IEC 27005:2018
+
+ https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/
+ ENISA Reference Incident Classification Taxonomy 2018
-
+
+ ENISA Threat Landscape 2021
+ https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021
+
+
+
+
+ Risk Concepts - N3 serialiation
+
-
-
- Risk Concepts - RDF/XML serialiation
-
-
-
- https://www.iso.org/standard/75281.html
-
- ISO/IEC 27005:2018
+
-
- 2022-08-17
-
-
-
-
-
- Harshvardhan J. Pandit
- Something that acts as or causes Unauthorised Data Access
- Unauthorised Data Access
- 2024-08-16
+
accepted
-
-
-
- Georg P. Krog, Harshvardhan J. Pandit
- This concept was called "LimitationOfRights" in DPV 2.0
- Something that acts as or causes Limitation of Rights
-
+
- Limitation of Rights
- 2022-08-18
- 2024-08-16
+ User Risks
- accepted
-
-
-
-
- ISO/IEC 27005:2018
- https://www.iso.org/standard/75281.html
+ Concepts associated with risks that arise due to User or Human use
+
-
- ENISA Reference Incident Classification Taxonomy 2018
+
https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/
+ ENISA Reference Incident Classification Taxonomy 2018
-
- https://www.iso.org/standard/75281.html
- ISO/IEC 27005:2018
-
+
+
+
+
+
+ Examples for Data Privacy Vocabulary
+
-
- https://www.iso.org/standard/75281.html
- ISO/IEC 27005:2018
+
-
-
https://www.iso.org/standard/75281.html
ISO/IEC 27005:2018
-
-
- https://www.iso.org/standard/75281.html
- ISO/IEC 27005:2018
+
+ https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/
+ ENISA Reference Incident Classification Taxonomy 2018
-
- https://www.iso.org/standard/75281.html
+
ISO/IEC 27005:2018
-
-
-
https://www.iso.org/standard/75281.html
- ISO/IEC 27005:2018
-
- https://www.iso.org/standard/75281.html
+
ISO/IEC 27005:2018
-
-
- ISO/IEC 27005:2018
https://www.iso.org/standard/75281.html
-
-
- https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks
+
+ https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks
ENISA Threat Landscape for Ransomware Attacks 2022
-
+
+ https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/
- https://www.iso.org/standard/75281.html
- ISO/IEC 27005:2018
+ ENISA Reference Incident Classification Taxonomy 2018
-
- ISO/IEC 27005:2018
+
+ ISO/IEC 27005:2018
https://www.iso.org/standard/75281.html
-
- ENISA Methodology for Sectoral Cybersecurity Assessments
-
- https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment
-
-
- https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view
- ENISA Threat Taxonomy 2016
+
+ https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks
+ ENISA Threat Landscape for Ransomware Attacks 2022
-
+
https://www.iso.org/standard/75281.html
- ISO/IEC 27005:2018
-
-
-
-
- https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/
- ENISA Reference Incident Classification Taxonomy 2018
-
-
- https://www.iso.org/standard/75281.html
ISO/IEC 27005:2018
-
- https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/
-
- ENISA Reference Incident Classification Taxonomy 2018
+
+ accepted
+
+
+
+ Physical Harm
+
+
-
- https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/
+
- ENISA Reference Incident Classification Taxonomy 2018
+ ISO/IEC 27005:2018
+ https://www.iso.org/standard/75281.html
-
- https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/
+
- ENISA Reference Incident Classification Taxonomy 2018
+ ISO/IEC 27005:2018
+ https://www.iso.org/standard/75281.html
-
+
https://www.iso.org/standard/75281.html
ISO/IEC 27005:2018
-
+
ISO/IEC 27005:2018
https://www.iso.org/standard/75281.html
-
-
- https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021
- ENISa Trust Services Security Incidents 2021
-
-
+
+ https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/
+ ENISA Reference Incident Classification Taxonomy 2018
- https://www.iso.org/standard/75281.html
- ISO/IEC 27005:2018
-
+
- ENISA Reference Incident Classification Taxonomy 2018
- https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/
-
-
- accepted
- Intentional Misuse
-
-
-
-
- Intentional Misuse
-
+ ENISA Threat Taxonomy 2016
+ https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view
-
- https://www.iso.org/standard/75281.html
- ISO/IEC 27005:2018
-
+
+
+
+
+
+
+ Guides for Data Privacy Vocabulary
-
- https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view
- ENISA Threat Taxonomy 2016
+
+ ISO/IEC 27005:2018
+ https://www.iso.org/standard/75281.html
-
+
- ENISA Reference Incident Classification Taxonomy 2018
- https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/
+ ISO/IEC 27005:2018
+ https://www.iso.org/standard/75281.html
-
-
+
Risk Concepts - HTML serialiation
-
+
+
-
+
https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment
ENISA Methodology for Sectoral Cybersecurity Assessments
-
+
+ ISO/IEC 27005:2018
https://www.iso.org/standard/75281.html
+
+
+
ISO/IEC 27005:2018
+ https://www.iso.org/standard/75281.html
-
+
+
+ ISO/IEC 27005:2018
+ https://www.iso.org/standard/75281.html
+
+
- ENISA Methodology for Sectoral Cybersecurity Assessments
https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment
+ ENISA Methodology for Sectoral Cybersecurity Assessments
-
- https://www.iso.org/standard/75281.html
- ISO/IEC 27005:2018
+
+ https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment
+ ENISA Methodology for Sectoral Cybersecurity Assessments
diff --git a/2.1-dev/risk/modules/risk_consequences-owl.ttl b/2.1-dev/risk/modules/risk_consequences-owl.ttl
index 100050053..1fdb2d194 100644
--- a/2.1-dev/risk/modules/risk_consequences-owl.ttl
+++ b/2.1-dev/risk/modules/risk_consequences-owl.ttl
@@ -34,7 +34,9 @@ risk-owl:AuthorisationFailure a rdfs:Class,
schema:name "ENISa Trust Services Security Incidents 2021" ;
schema:url "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:OperationalSecurityRisk ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:IntegrityConcept,
+ risk-owl:OperationalSecurityRisk ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Authorisation Failure"@en ;
skos:prefLabel "Authorisation Failure"@en .
@@ -43,7 +45,8 @@ risk-owl:AvailabilityBreach a rdfs:Class,
owl:Class,
dpv-owl:RiskConcept ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:DataBreach ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:DataBreach ;
sw:term_status "accepted"@en .
risk-owl:Benefit a rdfs:Class,
@@ -68,7 +71,8 @@ risk-owl:Blackmail a rdfs:Class,
schema:name "ISO/IEC 27005:2018" ;
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Blackmail"@en ;
skos:prefLabel "Blackmail"@en .
@@ -83,7 +87,9 @@ risk-owl:BruteForceAuthorisations a rdfs:Class,
schema:name "ENISA Reference Incident Classification Taxonomy 2018" ;
schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat,
+ risk-owl:IntegrityConcept ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ;
skos:prefLabel "Brute Force Authorisations"@en .
@@ -98,7 +104,8 @@ risk-owl:Coercion a rdfs:Class,
schema:name "ENISA Threat Taxonomy 2016" ;
schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Coercion"@en ;
skos:prefLabel "Coercion"@en .
@@ -119,7 +126,8 @@ risk-owl:ComponentFailure a rdfs:Class,
owl:Class,
dpv-owl:RiskConcept ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:OperationalSecurityRisk ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:OperationalSecurityRisk ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Component Failure"@en ;
skos:prefLabel "Component Failure"@en ;
@@ -129,7 +137,8 @@ risk-owl:ComponentMalfunction a rdfs:Class,
owl:Class,
dpv-owl:RiskConcept ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:OperationalSecurityRisk ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:OperationalSecurityRisk ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Component Malfunction"@en ;
skos:prefLabel "Component Malfunction"@en ;
@@ -145,7 +154,10 @@ risk-owl:CompromiseAccount a rdfs:Class,
schema:name "ENISA Reference Incident Classification Taxonomy 2018" ;
schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:OperationalSecurityRisk ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:ConfidentialityConcept,
+ risk-owl:IntegrityConcept,
+ risk-owl:OperationalSecurityRisk ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ;
skos:prefLabel "Compromise Account"@en .
@@ -160,7 +172,8 @@ risk-owl:CompromiseAccountCredentials a rdfs:Class,
schema:name "ENISA Reference Incident Classification Taxonomy 2018" ;
schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:OperationalSecurityRisk ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:OperationalSecurityRisk ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ;
skos:prefLabel "Compromise Account Credentials"@en .
@@ -175,7 +188,8 @@ risk-owl:ConfidentialityBreach a rdfs:Class,
schema:name "ISO/IEC 27005:2018" ;
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:DataBreach ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:DataBreach ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Confidentiality Breach"@en ;
skos:prefLabel "Confidentiality Breach"@en .
@@ -205,7 +219,8 @@ risk-owl:Cryptojacking a rdfs:Class,
schema:name "ENISA Threat Landscape 2021" ;
schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:ExternalSecurityThreat ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Cryptojacking"@en ;
skos:prefLabel "Cryptojacking"@en .
@@ -234,7 +249,10 @@ risk-owl:DataBreach a rdfs:Class,
vann:example dex-owl:E0069,
dex-owl:E0071 ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:SecurityBreach ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:ConfidentialityConcept,
+ risk-owl:IntegrityConcept,
+ risk-owl:SecurityBreach ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Data Breach"@en ;
skos:prefLabel "Data Breach"@en .
@@ -249,7 +267,8 @@ risk-owl:DataCorruption a rdfs:Class,
schema:name "ISO/IEC 27005:2018" ;
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:OperationalSecurityRisk ;
+ rdfs:subClassOf risk-owl:IntegrityConcept,
+ risk-owl:OperationalSecurityRisk ;
sw:term_status "modified"@en ;
skos:definition "Something that acts as or causes Corruption of Data"@en ;
skos:prefLabel "Data Corruption"@en ;
@@ -262,13 +281,11 @@ risk-owl:DenialServiceAttack a rdfs:Class,
dct:created "2022-08-17"^^xsd:date ;
dct:modified "2024-08-16"^^xsd:date ;
dct:source [ a schema:WebPage ;
- schema:name "ISO/IEC 27005:2018" ;
- schema:url "https://www.iso.org/standard/75281.html" ],
- [ a schema:WebPage ;
schema:name "ISO/IEC 27005:2018" ;
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:ExternalSecurityThreat ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ;
skos:prefLabel "Denial of Service Attack (DoS)"@en .
@@ -307,7 +324,8 @@ risk-owl:DistributedDenialServiceAttack a rdfs:Class,
schema:name "ISO/IEC 27005:2018" ;
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:ExternalSecurityThreat ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ;
skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en .
@@ -331,7 +349,8 @@ risk-owl:EquipmentFailure a rdfs:Class,
schema:name "ISO/IEC 27005:2018" ;
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:OperationalSecurityRisk ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:OperationalSecurityRisk ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Equipment Failure"@en ;
skos:prefLabel "Equipment Failure"@en ;
@@ -347,7 +366,8 @@ risk-owl:EquipmentMalfunction a rdfs:Class,
schema:name "ISO/IEC 27005:2018" ;
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:OperationalSecurityRisk ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:OperationalSecurityRisk ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Equipment Malfunction"@en ;
skos:prefLabel "Equipment Malfunction"@en ;
@@ -403,7 +423,8 @@ risk-owl:Extorsion a rdfs:Class,
schema:name "ENISA Threat Taxonomy 2016" ;
schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Extorsion"@en ;
skos:prefLabel "Extorsion"@en .
@@ -455,7 +476,8 @@ risk-owl:Fraud a rdfs:Class,
schema:name "ISO/IEC 27005:2018" ;
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Fraud"@en ;
skos:prefLabel "Fraud"@en .
@@ -498,7 +520,8 @@ risk-owl:IdentityFraud a rdfs:Class,
schema:name "ENISA Threat Taxonomy 2016" ;
schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:OperationalSecurityRisk ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:OperationalSecurityRisk ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Identity Fraud"@en ;
skos:prefLabel "Identity Fraud"@en .
@@ -513,7 +536,8 @@ risk-owl:IdentityTheft a rdfs:Class,
schema:name "ENISA Threat Taxonomy 2016" ;
schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:OperationalSecurityRisk ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:OperationalSecurityRisk ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Identity Theft"@en ;
skos:prefLabel "Identity Theft"@en .
@@ -568,7 +592,8 @@ risk-owl:IntegrityBreach a rdfs:Class,
owl:Class,
dpv-owl:RiskConcept ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:DataBreach ;
+ rdfs:subClassOf risk-owl:DataBreach,
+ risk-owl:IntegrityConcept ;
sw:term_status "accepted"@en .
risk-owl:IntentionalMisuse a rdfs:Class,
@@ -590,21 +615,13 @@ risk-owl:InterceptCommunications a rdfs:Class,
schema:name "ISO/IEC 27005:2018" ;
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat ;
sw:term_status "modified"@en ;
skos:definition "Something that acts as or causes Interception of Communications"@en ;
skos:prefLabel "Intercept Communications"@en ;
skos:scopeNote "This concept was called \"InterceptionCommunications\" in DPV 2.0"@en .
-risk-owl:InternalSecurityThreat a rdfs:Class,
- owl:Class,
- dpv-owl:RiskConcept ;
- rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf dpv-owl:RiskConcept ;
- sw:term_status "accepted"@en ;
- skos:definition "Concepts associated with security threats and issues that originate within the organisation"@en ;
- skos:prefLabel "Internal Security Threat"@en .
-
risk-owl:JudicialCosts a rdfs:Class,
owl:Class,
dpv-owl:RiskConcept ;
@@ -747,7 +764,10 @@ risk-owl:MaliciousCodeAttack a rdfs:Class,
schema:name "ENISA Reference Incident Classification Taxonomy 2018" ;
schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat,
+ risk-owl:IntegrityConcept ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Malicious Code Attack"@en ;
skos:prefLabel "Malicious Code Attack"@en .
@@ -762,7 +782,10 @@ risk-owl:MalwareAttack a rdfs:Class,
schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ;
schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat,
+ risk-owl:IntegrityConcept ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Malware Attack"@en ;
skos:prefLabel "Malware Attack"@en .
@@ -851,7 +874,8 @@ risk-owl:PhishingScam a rdfs:Class,
schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ;
schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Phishing Scam"@en ;
skos:prefLabel "Phishing Scam"@en .
@@ -924,7 +948,8 @@ risk-owl:Reidentification a rdfs:Class,
dct:created "2022-08-19"^^xsd:date ;
dct:modified "2024-08-16"^^xsd:date ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:OperationalSecurityRisk ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:OperationalSecurityRisk ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Re-identification"@en ;
skos:prefLabel "Re-identification"@en ;
@@ -1029,7 +1054,9 @@ risk-owl:Sabotage a rdfs:Class,
schema:name "ENISA Reference Incident Classification Taxonomy 2018" ;
schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:ExternalSecurityThreat,
+ risk-owl:IntegrityConcept ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Sabotage"@en ;
skos:prefLabel "Sabotage"@en .
@@ -1044,7 +1071,8 @@ risk-owl:Scam a rdfs:Class,
schema:name "ISO/IEC 27005:2018" ;
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Scam"@en ;
skos:prefLabel "Scam"@en .
@@ -1053,7 +1081,10 @@ risk-owl:SecurityAttack a rdfs:Class,
owl:Class,
dpv-owl:RiskConcept ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat,
+ risk-owl:IntegrityConcept ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ;
skos:prefLabel "Security Attack"@en .
@@ -1068,7 +1099,10 @@ risk-owl:SecurityBreach a rdfs:Class,
schema:name "ISO/IEC 27005:2018" ;
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:OperationalSecurityRisk ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:ConfidentialityConcept,
+ risk-owl:IntegrityConcept,
+ risk-owl:OperationalSecurityRisk ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Security Breach"@en ;
skos:prefLabel "Security Breach"@en .
@@ -1130,7 +1164,9 @@ risk-owl:Spoofing a rdfs:Class,
schema:name "ISO/IEC 27005:2018" ;
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat,
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat,
+ risk-owl:IntegrityConcept,
risk-owl:OperationalSecurityRisk ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Spoofing"@en ;
@@ -1146,7 +1182,8 @@ risk-owl:SystemFailure a rdfs:Class,
schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ;
schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:OperationalSecurityRisk ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:OperationalSecurityRisk ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes System Failure"@en ;
skos:prefLabel "System Failure"@en ;
@@ -1162,7 +1199,10 @@ risk-owl:SystemIntrusion a rdfs:Class,
schema:name "ENISA Reference Incident Classification Taxonomy 2018" ;
schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat,
+ risk-owl:IntegrityConcept ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes System Intrusion"@en ;
skos:prefLabel "System Intrusion"@en .
@@ -1177,7 +1217,8 @@ risk-owl:SystemMalfunction a rdfs:Class,
schema:name "ISO/IEC 27005:2018" ;
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:OperationalSecurityRisk ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:OperationalSecurityRisk ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes System Malfunction"@en ;
skos:prefLabel "System Malfunction"@en ;
@@ -1208,7 +1249,10 @@ risk-owl:UnauthorisedAccesstoPremises a rdfs:Class,
schema:name "ISO/IEC 27005:2018" ;
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat,
+ risk-owl:IntegrityConcept ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ;
skos:prefLabel "Unauthorised Access to Premises"@en .
@@ -1217,7 +1261,10 @@ risk-owl:UnauthorisedActivity a rdfs:Class,
owl:Class,
dpv-owl:RiskConcept ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat,
+ risk-owl:IntegrityConcept ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Unauthorised Activity"@en ;
skos:prefLabel "Unauthorised Activity"@en .
@@ -1232,7 +1279,9 @@ risk-owl:UnauthorisedCodeAccess a rdfs:Class,
schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ;
schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat,
+ risk-owl:IntegrityConcept ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Unauthorised Code Access"@en ;
skos:prefLabel "Unauthorised Code Access"@en .
@@ -1247,7 +1296,8 @@ risk-owl:UnauthorisedCodeDisclosure a rdfs:Class,
schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ;
schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ;
skos:prefLabel "Unauthorised Code Disclosure"@en .
@@ -1262,7 +1312,8 @@ risk-owl:UnauthorisedCodeModification a rdfs:Class,
schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ;
schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:ExternalSecurityThreat,
+ risk-owl:IntegrityConcept ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ;
skos:prefLabel "Unauthorised Code Modification"@en .
@@ -1277,7 +1328,8 @@ risk-owl:UnauthorisedDataAccess a rdfs:Class,
schema:name "ENISA Reference Incident Classification Taxonomy 2018" ;
schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Unauthorised Data Access"@en ;
skos:prefLabel "Unauthorised Data Access"@en .
@@ -1292,7 +1344,8 @@ risk-owl:UnauthorisedDataDisclosure a rdfs:Class,
schema:name "ISO/IEC 27005:2018" ;
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ;
skos:prefLabel "Unauthorised Data Disclosure"@en .
@@ -1307,7 +1360,8 @@ risk-owl:UnauthorisedDataModification a rdfs:Class,
schema:name "ENISA Reference Incident Classification Taxonomy 2018" ;
schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:ExternalSecurityThreat,
+ risk-owl:IntegrityConcept ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ;
skos:prefLabel "Unauthorised Data Modification"@en .
@@ -1322,7 +1376,8 @@ risk-owl:UnauthorisedInformationDisclosure a rdfs:Class,
schema:name "ENISA Reference Incident Classification Taxonomy 2018" ;
schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ;
skos:prefLabel "Unauthorised Information Disclosure"@en .
@@ -1334,7 +1389,8 @@ risk-owl:UnauthorisedReidentification a rdfs:Class,
dct:created "2022-08-19"^^xsd:date ;
dct:modified "2024-08-16"^^xsd:date ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ;
skos:prefLabel "Unauthorised Re-Identification"@en .
@@ -1349,7 +1405,8 @@ risk-owl:UnauthorisedResourceUse a rdfs:Class,
schema:name "ISO/IEC 27005:2018" ;
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:ExternalSecurityThreat ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ;
skos:prefLabel "Unauthorised Resource Use"@en .
@@ -1364,7 +1421,9 @@ risk-owl:UnauthorisedSystemAccess a rdfs:Class,
schema:name "ISO/IEC 27005:2018" ;
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat,
+ risk-owl:IntegrityConcept ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Unauthorised System Access"@en ;
skos:prefLabel "Unauthorised System Access"@en .
@@ -1379,7 +1438,8 @@ risk-owl:UnauthorisedSystemModification a rdfs:Class,
schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ;
schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:ExternalSecurityThreat,
+ risk-owl:IntegrityConcept ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Unauthorised System Modification"@en ;
skos:prefLabel "Unauthorised System Modification"@en .
@@ -1394,7 +1454,9 @@ risk-owl:UnwantedCodeDeletion a rdfs:Class,
schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ;
schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:ExternalSecurityThreat,
+ risk-owl:IntegrityConcept ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ;
skos:prefLabel "Unwanted Code Deletion"@en .
@@ -1409,7 +1471,9 @@ risk-owl:UnwantedDataDeletion a rdfs:Class,
schema:name "ISO/IEC 27005:2018" ;
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:AvailabilityConcept,
+ risk-owl:ExternalSecurityThreat,
+ risk-owl:IntegrityConcept ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ;
skos:prefLabel "Unwanted Data Deletion"@en .
@@ -1424,7 +1488,8 @@ risk-owl:UnwantedDisclosureData a rdfs:Class,
schema:name "ISO/IEC 27005:2018" ;
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:ExternalSecurityThreat ;
+ rdfs:subClassOf risk-owl:ConfidentialityConcept,
+ risk-owl:ExternalSecurityThreat ;
sw:term_status "accepted"@en ;
skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ;
skos:prefLabel "Unwanted Disclosure of Data"@en .
@@ -1543,21 +1608,6 @@ risk-owl:ViolenceAgainstChildren a rdfs:Class,
skos:prefLabel "Violence against children"@en ;
skos:scopeNote "This concept was called \"ChildViolence\" in DPV 2.0"@en .
-risk-owl:VulnerabilityCreated a rdfs:Class,
- owl:Class,
- dpv-owl:RiskConcept ;
- dct:contributor "Harshvardhan J. Pandit" ;
- dct:created "2022-08-17"^^xsd:date ;
- dct:modified "2024-08-16"^^xsd:date ;
- dct:source [ a schema:WebPage ;
- schema:name "ISO/IEC 27005:2018" ;
- schema:url "https://www.iso.org/standard/75281.html" ] ;
- rdfs:isDefinedBy risk-owl: ;
- rdfs:subClassOf risk-owl:InternalSecurityThreat ;
- sw:term_status "accepted"@en ;
- skos:definition "Something that acts as or causes Vulnerability Created"@en ;
- skos:prefLabel "Vulnerability Created"@en .
-
risk-owl:serialisation-html a profile:ResourceDescriptor ;
dct:conformsTo ;
dct:format ;
diff --git a/2.1-dev/risk/modules/risk_consequences.csv b/2.1-dev/risk/modules/risk_consequences.csv
index f928036db..8d54ca551 100644
--- a/2.1-dev/risk/modules/risk_consequences.csv
+++ b/2.1-dev/risk/modules/risk_consequences.csv
@@ -1,47 +1,46 @@
term,type,iri,label,definition,dpvtype,subclassof,hasbroader,scopenote,created,modified,vocab,namespace
AccidentalMisuse,class,https://w3id.org/dpv/risk#AccidentalMisuse,Accidental Misuse,Accidental Misuse,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,,,risk,https://w3id.org/dpv/risk
-AuthorisationFailure,class,https://w3id.org/dpv/risk#AuthorisationFailure,Authorisation Failure,Something that acts as or causes Authorisation Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
+AuthorisationFailure,class,https://w3id.org/dpv/risk#AuthorisationFailure,Authorisation Failure,Something that acts as or causes Authorisation Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
Benefit,class,https://w3id.org/dpv/risk#Benefit,Benefit,Something that acts as or causes benefits,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2022-03-23,2024-08-16,risk,https://w3id.org/dpv/risk
-Blackmail,class,https://w3id.org/dpv/risk#Blackmail,Blackmail,Something that acts as or causes Blackmail,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
-BruteForceAuthorisations,class,https://w3id.org/dpv/risk#BruteForceAuthorisations,Brute Force Authorisations,Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
-Coercion,class,https://w3id.org/dpv/risk#Coercion,Coercion,Something that acts as or causes Coercion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
+Blackmail,class,https://w3id.org/dpv/risk#Blackmail,Blackmail,Something that acts as or causes Blackmail,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
+BruteForceAuthorisations,class,https://w3id.org/dpv/risk#BruteForceAuthorisations,Brute Force Authorisations,Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
+Coercion,class,https://w3id.org/dpv/risk#Coercion,Coercion,Something that acts as or causes Coercion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
Compensation,class,https://w3id.org/dpv/risk#Compensation,Compensation,Something that acts as or provides compensation - which can be monetary and financial or in other forms,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk
-ComponentFailure,class,https://w3id.org/dpv/risk#ComponentFailure,Component Failure,Something that acts as or causes Component Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk
-ComponentMalfunction,class,https://w3id.org/dpv/risk#ComponentMalfunction,Component Malfunction,Something that acts as or causes Component Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk
-CompromiseAccount,class,https://w3id.org/dpv/risk#CompromiseAccount,Compromise Account,Something that acts as or causes a compromised account that is then used by the compromiser,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
-CompromiseAccountCredentials,class,https://w3id.org/dpv/risk#CompromiseAccountCredentials,Compromise Account Credentials,Something that acts as or causes Account Credentials to be compromised,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
-ConfidentialityBreach,class,https://w3id.org/dpv/risk#ConfidentialityBreach,Confidentiality Breach,Something that acts as or causes Confidentiality Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#DataBreach,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
+ComponentFailure,class,https://w3id.org/dpv/risk#ComponentFailure,Component Failure,Something that acts as or causes Component Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk
+ComponentMalfunction,class,https://w3id.org/dpv/risk#ComponentMalfunction,Component Malfunction,Something that acts as or causes Component Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk
+CompromiseAccount,class,https://w3id.org/dpv/risk#CompromiseAccount,Compromise Account,Something that acts as or causes a compromised account that is then used by the compromiser,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
+CompromiseAccountCredentials,class,https://w3id.org/dpv/risk#CompromiseAccountCredentials,Compromise Account Credentials,Something that acts as or causes Account Credentials to be compromised,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
+ConfidentialityBreach,class,https://w3id.org/dpv/risk#ConfidentialityBreach,Confidentiality Breach,Something that acts as or causes Confidentiality Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#DataBreach,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
CopyrightViolation,class,https://w3id.org/dpv/risk#CopyrightViolation,Copyright Violation,Something that acts as or causes Copyright Violation,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
-Cryptojacking,class,https://w3id.org/dpv/risk#Cryptojacking,Cryptojacking,Something that acts as or causes Cryptojacking,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
+Cryptojacking,class,https://w3id.org/dpv/risk#Cryptojacking,Cryptojacking,Something that acts as or causes Cryptojacking,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
Damage,class,https://w3id.org/dpv/risk#Damage,Damage,Something that acts as or causes Damage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk
-DataBreach,class,https://w3id.org/dpv/risk#DataBreach,Data Breach,Something that acts as or causes Data Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SecurityBreach,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
-DataCorruption,class,https://w3id.org/dpv/risk#DataCorruption,Data Corruption,Something that acts as or causes Corruption of Data,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,"This concept was called ""Corruption Data"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
-DenialServiceAttack,class,https://w3id.org/dpv/risk#DenialServiceAttack,Denial of Service Attack (DoS),Something that acts as or causes Denial of Service Attack (DoS),https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
+DataBreach,class,https://w3id.org/dpv/risk#DataBreach,Data Breach,Something that acts as or causes Data Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#SecurityBreach,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
+DataCorruption,class,https://w3id.org/dpv/risk#DataCorruption,Data Corruption,Something that acts as or causes Corruption of Data,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,"This concept was called ""Corruption Data"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
+DenialServiceAttack,class,https://w3id.org/dpv/risk#DenialServiceAttack,Denial of Service Attack (DoS),Something that acts as or causes Denial of Service Attack (DoS),https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
Detriment,class,https://w3id.org/dpv/risk#Detriment,Detriment,Something that acts as or causes Detriment,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-03-23,2024-08-16,risk,https://w3id.org/dpv/risk
Discrimination,class,https://w3id.org/dpv/risk#Discrimination,Discrimination,Something that acts as or causes Discrimination,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk
-DistributedDenialServiceAttack,class,https://w3id.org/dpv/risk#DistributedDenialServiceAttack,Distributed Denial of Service Attack (DDoS),Something that acts as or causes Distributed Denial of Service Attack (DDoS),https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
+DistributedDenialServiceAttack,class,https://w3id.org/dpv/risk#DistributedDenialServiceAttack,Distributed Denial of Service Attack (DDoS),Something that acts as or causes Distributed Denial of Service Attack (DDoS),https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
EnvironmentalRisk,class,https://w3id.org/dpv/risk#EnvironmentalRisk,Environmental Risk,Risks and issues that have their origin in environment or can affect the environment at large,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk
-EquipmentFailure,class,https://w3id.org/dpv/risk#EquipmentFailure,Equipment Failure,Something that acts as or causes Equipment Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
-EquipmentMalfunction,class,https://w3id.org/dpv/risk#EquipmentMalfunction,Equipment Malfunction,Something that acts as or causes Equipment Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
+EquipmentFailure,class,https://w3id.org/dpv/risk#EquipmentFailure,Equipment Failure,Something that acts as or causes Equipment Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
+EquipmentMalfunction,class,https://w3id.org/dpv/risk#EquipmentMalfunction,Equipment Malfunction,Something that acts as or causes Equipment Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
ErroneousSystemUse,class,https://w3id.org/dpv/risk#ErroneousSystemUse,Erroneous System Use,Something that acts as or causes Erroneous System Use,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
ExposureToHarmfulSpeech,class,https://w3id.org/dpv/risk#ExposureToHarmfulSpeech,Exposure to Harmful Speech,Something that acts as or causes Harmful Speech,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""HarmfulSpeech"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
ExternalSecurityThreat,class,https://w3id.org/dpv/risk#ExternalSecurityThreat,External Security Threat,Concepts associated with security threats that are likely to originate externally,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk
-Extorsion,class,https://w3id.org/dpv/risk#Extorsion,Extorsion,Something that acts as or causes Extorsion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
+Extorsion,class,https://w3id.org/dpv/risk#Extorsion,Extorsion,Something that acts as or causes Extorsion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
Fee,class,https://w3id.org/dpv/risk#Fee,Fee,Something that acts as or provides fees e.g. for using a service,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk
FinancialImpact,class,https://w3id.org/dpv/risk#FinancialImpact,Financial Impact,Things that cause or have the potential to impact financial resources,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk
FinancialLoss,class,https://w3id.org/dpv/risk#FinancialLoss,Financial Loss,Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
-Fraud,class,https://w3id.org/dpv/risk#Fraud,Fraud,Something that acts as or causes Fraud,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
+Fraud,class,https://w3id.org/dpv/risk#Fraud,Fraud,Something that acts as or causes Fraud,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
Harm,class,https://w3id.org/dpv/risk#Harm,Harm,Something that acts as or causes Harm to humans,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,This concept refers to the general abstract notion of harm,2022-08-13,2024-08-16,risk,https://w3id.org/dpv/risk
HumanErrors,class,https://w3id.org/dpv/risk#HumanErrors,Human Errors,Something that acts as or causes Human Errors,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
-IdentityFraud,class,https://w3id.org/dpv/risk#IdentityFraud,Identity Fraud,Something that acts as or causes Identity Fraud,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
-IdentityTheft,class,https://w3id.org/dpv/risk#IdentityTheft,Identity Theft,Something that acts as or causes Identity Theft,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
+IdentityFraud,class,https://w3id.org/dpv/risk#IdentityFraud,Identity Fraud,Something that acts as or causes Identity Fraud,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
+IdentityTheft,class,https://w3id.org/dpv/risk#IdentityTheft,Identity Theft,Something that acts as or causes Identity Theft,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
IllegalDataProcessing,class,https://w3id.org/dpv/risk#IllegalDataProcessing,Illegal Data Processing,Something that acts as or causes Illegal Processing of Data,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""IllegalProcessingData"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
IndividualHealthSafety,class,https://w3id.org/dpv/risk#IndividualHealthSafety,Individual Health & Safety,,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,,,risk,https://w3id.org/dpv/risk
IndividualRisk,class,https://w3id.org/dpv/risk#IndividualRisk,Individual Risk,Risks and issues that affect or have the potential to affect specific individuals,,,,,,,risk,https://w3id.org/dpv/risk
Injury,class,https://w3id.org/dpv/risk#Injury,Injury,Something that acts as or causes Injury,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
IntentionalMisuse,class,https://w3id.org/dpv/risk#IntentionalMisuse,Intentional Misuse,Intentional Misuse,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,,,risk,https://w3id.org/dpv/risk
-InterceptCommunications,class,https://w3id.org/dpv/risk#InterceptCommunications,Intercept Communications,Something that acts as or causes Interception of Communications,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,"This concept was called ""InterceptionCommunications"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
-InternalSecurityThreat,class,https://w3id.org/dpv/risk#InternalSecurityThreat,Internal Security Threat,Concepts associated with security threats and issues that originate within the organisation,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk
+InterceptCommunications,class,https://w3id.org/dpv/risk#InterceptCommunications,Intercept Communications,Something that acts as or causes Interception of Communications,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,"This concept was called ""InterceptionCommunications"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
JudicialCosts,class,https://w3id.org/dpv/risk#JudicialCosts,Judicial Costs,Something that involves or causes judicial costs to be paid,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,,,risk,https://w3id.org/dpv/risk
JudicialPenalty,class,https://w3id.org/dpv/risk#JudicialPenalty,Judicial Penalty,Something that involves or causes judicial penalties to be paid,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,,,risk,https://w3id.org/dpv/risk
LegalRisk,class,https://w3id.org/dpv/risk#LegalRisk,Legal Risk,Risks and issues that have their basis in legal requirements and enforcement,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk
@@ -52,21 +51,21 @@ LoseNegotiatingCapacity,class,https://w3id.org/dpv/risk#LoseNegotiatingCapacity,
LoseOpportunity,class,https://w3id.org/dpv/risk#LoseOpportunity,Lose of Opportunity,Something that acts as or causes Loss of Opportunity,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
LoseReputation,class,https://w3id.org/dpv/risk#LoseReputation,Lose of Reputation,Something that acts as or causes Loss of Reputation,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
LoseTrust,class,https://w3id.org/dpv/risk#LoseTrust,Lose of Trust,Something that acts as or causes Loss of Trust,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
-MaliciousCodeAttack,class,https://w3id.org/dpv/risk#MaliciousCodeAttack,Malicious Code Attack,Something that acts as or causes Malicious Code Attack,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
-MalwareAttack,class,https://w3id.org/dpv/risk#MalwareAttack,Malware Attack,Something that acts as or causes Malware Attack,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
+MaliciousCodeAttack,class,https://w3id.org/dpv/risk#MaliciousCodeAttack,Malicious Code Attack,Something that acts as or causes Malicious Code Attack,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
+MalwareAttack,class,https://w3id.org/dpv/risk#MalwareAttack,Malware Attack,Something that acts as or causes Malware Attack,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
MaterialDamage,class,https://w3id.org/dpv/risk#MaterialDamage,Material Damage,Something that acts as or causes Material Damage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,The criteria for what is considered material damage is based in jurisdictional laws and norms,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk
Misuse,class,https://w3id.org/dpv/risk#Misuse,Misuse,Something that acts as or causes Misuse,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,2024-06-11,2024-08-16,risk,https://w3id.org/dpv/risk
NonMaterialDamage,class,https://w3id.org/dpv/risk#NonMaterialDamage,Non-Material Damage,Something that acts as or causes Non-Material Damage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,The criteria for what is considered material damage is based in jurisdictional laws and norms,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk
OperationalSecurityRisk,class,https://w3id.org/dpv/risk#OperationalSecurityRisk,Operational Security Risk,Risks and issues that arise during operational processes,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk
Payment,class,https://w3id.org/dpv/risk#Payment,Payment,Something that acts as or provides payment e.g. to access a service or purchase resources,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk
PersonalSafetyEndangerment,class,https://w3id.org/dpv/risk#PersonalSafetyEndangerment,Personal Safety Endangerment,Something that acts as or causes Personal Safety Endangerment,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
-PhishingScam,class,https://w3id.org/dpv/risk#PhishingScam,Phishing Scam,Something that acts as or causes Phishing Scam,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
+PhishingScam,class,https://w3id.org/dpv/risk#PhishingScam,Phishing Scam,Something that acts as or causes Phishing Scam,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
PhysicalAssault,class,https://w3id.org/dpv/risk#PhysicalAssault,Physical Assault,Something that acts as or causes Physical Assault,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
PhysicalHarm,class,https://w3id.org/dpv/risk#PhysicalHarm,Physical Harm,,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,,,risk,https://w3id.org/dpv/risk
Privacy,class,https://w3id.org/dpv/risk#Privacy,Privacy,,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,,,risk,https://w3id.org/dpv/risk
PsychologicalHarm,class,https://w3id.org/dpv/risk#PsychologicalHarm,Psychological Harm,Something that acts as or causes Psychological Harm,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
PublicOrderBreach,class,https://w3id.org/dpv/risk#PublicOrderBreach,Public Order Breach,Something that acts as or causes Public Order Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
-Reidentification,class,https://w3id.org/dpv/risk#Reidentification,Re-identification,Something that acts as or causes Re-identification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk
+Reidentification,class,https://w3id.org/dpv/risk#Reidentification,Re-identification,Something that acts as or causes Re-identification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk
Renumeration,class,https://w3id.org/dpv/risk#Renumeration,Remuneration,Something that acts as or provides renumeration which is in monetary or financial form,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk
ReputationalRisk,class,https://w3id.org/dpv/risk#ReputationalRisk,Reputational Risk,Risks and issues that affect the reputation of the organisation,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk
Reward,class,https://w3id.org/dpv/risk#Reward,Reward,Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk
@@ -74,35 +73,35 @@ RightsExercisePrevention,class,https://w3id.org/dpv/risk#RightsExercisePreventio
RightsImpact,class,https://w3id.org/dpv/risk#RightsImpact,Impact to Rights,Something that acts as or causes Impact to Rights,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#Impact;https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""ImpactToRights"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
RightsLimitation,class,https://w3id.org/dpv/risk#RightsLimitation,Limitation of Rights,Something that acts as or causes Limitation of Rights,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""LimitationOfRights"" in DPV 2.0",2022-08-18,2024-08-16,risk,https://w3id.org/dpv/risk
RightsViolation,class,https://w3id.org/dpv/risk#RightsViolation,Violation of Rights,Something that acts as or causes Violation of Rights,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""ViolationOfRights"" in DPV 2.0",2022-08-18,2024-08-16,risk,https://w3id.org/dpv/risk
-Sabotage,class,https://w3id.org/dpv/risk#Sabotage,Sabotage,Something that acts as or causes Sabotage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
-Scam,class,https://w3id.org/dpv/risk#Scam,Scam,Something that acts as or causes Scam,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
-SecurityAttack,class,https://w3id.org/dpv/risk#SecurityAttack,Security Attack,Something that acts as or causes an attack on security with the aim of undermining it,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk
-SecurityBreach,class,https://w3id.org/dpv/risk#SecurityBreach,Security Breach,Something that acts as or causes Security Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
+Sabotage,class,https://w3id.org/dpv/risk#Sabotage,Sabotage,Something that acts as or causes Sabotage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
+Scam,class,https://w3id.org/dpv/risk#Scam,Scam,Something that acts as or causes Scam,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
+SecurityAttack,class,https://w3id.org/dpv/risk#SecurityAttack,Security Attack,Something that acts as or causes an attack on security with the aim of undermining it,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk
+SecurityBreach,class,https://w3id.org/dpv/risk#SecurityBreach,Security Breach,Something that acts as or causes Security Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
SexualViolence,class,https://w3id.org/dpv/risk#SexualViolence,Sexual Violence,Something that acts as or causes Sexual Violence,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
SocialDisadvantage,class,https://w3id.org/dpv/risk#SocialDisadvantage,Social Disadvantage,Something that acts as or causes Social Disadvantage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk
SocietalHealthSafety,class,https://w3id.org/dpv/risk#SocietalHealthSafety,Societal Health & Safety,,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,,,risk,https://w3id.org/dpv/risk
SocietalRisk,class,https://w3id.org/dpv/risk#SocietalRisk,Societal Risk,Risks and issues that affect or have the potential to affect society at large or specific groups in society,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk
-Spoofing,class,https://w3id.org/dpv/risk#Spoofing,Spoofing,Something that acts as or causes Spoofing,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
-SystemFailure,class,https://w3id.org/dpv/risk#SystemFailure,System Failure,Something that acts as or causes System Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
-SystemIntrusion,class,https://w3id.org/dpv/risk#SystemIntrusion,System Intrusion,Something that acts as or causes System Intrusion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
-SystemMalfunction,class,https://w3id.org/dpv/risk#SystemMalfunction,System Malfunction,Something that acts as or causes System Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
+Spoofing,class,https://w3id.org/dpv/risk#Spoofing,Spoofing,Something that acts as or causes Spoofing,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
+SystemFailure,class,https://w3id.org/dpv/risk#SystemFailure,System Failure,Something that acts as or causes System Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
+SystemIntrusion,class,https://w3id.org/dpv/risk#SystemIntrusion,System Intrusion,Something that acts as or causes System Intrusion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
+SystemMalfunction,class,https://w3id.org/dpv/risk#SystemMalfunction,System Malfunction,Something that acts as or causes System Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
Terrorism,class,https://w3id.org/dpv/risk#Terrorism,Terrorism,Something that acts as or causes Terrorism,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
-UnauthorisedAccesstoPremises,class,https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises,Unauthorised Access to Premises,Something that acts as or causes Unauthorised Access to Premises,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
-UnauthorisedActivity,class,https://w3id.org/dpv/risk#UnauthorisedActivity,Unauthorised Activity,Something that acts as or causes Unauthorised Activity,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk
-UnauthorisedCodeAccess,class,https://w3id.org/dpv/risk#UnauthorisedCodeAccess,Unauthorised Code Access,Something that acts as or causes Unauthorised Code Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
-UnauthorisedCodeDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure,Unauthorised Code Disclosure,Something that acts as or causes Unauthorised Code Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
-UnauthorisedCodeModification,class,https://w3id.org/dpv/risk#UnauthorisedCodeModification,Unauthorised Code Modification,Something that acts as or causes Unauthorised Code Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
-UnauthorisedDataAccess,class,https://w3id.org/dpv/risk#UnauthorisedDataAccess,Unauthorised Data Access,Something that acts as or causes Unauthorised Data Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
-UnauthorisedDataDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedDataDisclosure,Unauthorised Data Disclosure,Something that acts as or causes Unauthorised Data Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
-UnauthorisedDataModification,class,https://w3id.org/dpv/risk#UnauthorisedDataModification,Unauthorised Data Modification,Something that acts as or causes Unauthorised Data Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
-UnauthorisedInformationDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure,Unauthorised Information Disclosure,Something that acts as or causes Unauthorised Information Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
-UnauthorisedReidentification,class,https://w3id.org/dpv/risk#UnauthorisedReidentification,Unauthorised Re-Identification,Something that acts as or causes Unauthorised Re-Identification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk
-UnauthorisedResourceUse,class,https://w3id.org/dpv/risk#UnauthorisedResourceUse,Unauthorised Resource Use,Something that acts as or causes Unauthorised Resource Use,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
-UnauthorisedSystemAccess,class,https://w3id.org/dpv/risk#UnauthorisedSystemAccess,Unauthorised System Access,Something that acts as or causes Unauthorised System Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
-UnauthorisedSystemModification,class,https://w3id.org/dpv/risk#UnauthorisedSystemModification,Unauthorised System Modification,Something that acts as or causes Unauthorised System Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
-UnwantedCodeDeletion,class,https://w3id.org/dpv/risk#UnwantedCodeDeletion,Unwanted Code Deletion,Something that acts as or causes Unwanted Code Deletion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
-UnwantedDataDeletion,class,https://w3id.org/dpv/risk#UnwantedDataDeletion,Unwanted Data Deletion,Something that acts as or causes Unwanted Data Deletion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
-UnwantedDisclosureData,class,https://w3id.org/dpv/risk#UnwantedDisclosureData,Unwanted Disclosure of Data,Something that acts as or causes Unwanted Disclosure of Data,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
+UnauthorisedAccesstoPremises,class,https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises,Unauthorised Access to Premises,Something that acts as or causes Unauthorised Access to Premises,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
+UnauthorisedActivity,class,https://w3id.org/dpv/risk#UnauthorisedActivity,Unauthorised Activity,Something that acts as or causes Unauthorised Activity,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk
+UnauthorisedCodeAccess,class,https://w3id.org/dpv/risk#UnauthorisedCodeAccess,Unauthorised Code Access,Something that acts as or causes Unauthorised Code Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
+UnauthorisedCodeDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure,Unauthorised Code Disclosure,Something that acts as or causes Unauthorised Code Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
+UnauthorisedCodeModification,class,https://w3id.org/dpv/risk#UnauthorisedCodeModification,Unauthorised Code Modification,Something that acts as or causes Unauthorised Code Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
+UnauthorisedDataAccess,class,https://w3id.org/dpv/risk#UnauthorisedDataAccess,Unauthorised Data Access,Something that acts as or causes Unauthorised Data Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
+UnauthorisedDataDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedDataDisclosure,Unauthorised Data Disclosure,Something that acts as or causes Unauthorised Data Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
+UnauthorisedDataModification,class,https://w3id.org/dpv/risk#UnauthorisedDataModification,Unauthorised Data Modification,Something that acts as or causes Unauthorised Data Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
+UnauthorisedInformationDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure,Unauthorised Information Disclosure,Something that acts as or causes Unauthorised Information Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
+UnauthorisedReidentification,class,https://w3id.org/dpv/risk#UnauthorisedReidentification,Unauthorised Re-Identification,Something that acts as or causes Unauthorised Re-Identification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk
+UnauthorisedResourceUse,class,https://w3id.org/dpv/risk#UnauthorisedResourceUse,Unauthorised Resource Use,Something that acts as or causes Unauthorised Resource Use,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
+UnauthorisedSystemAccess,class,https://w3id.org/dpv/risk#UnauthorisedSystemAccess,Unauthorised System Access,Something that acts as or causes Unauthorised System Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
+UnauthorisedSystemModification,class,https://w3id.org/dpv/risk#UnauthorisedSystemModification,Unauthorised System Modification,Something that acts as or causes Unauthorised System Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
+UnwantedCodeDeletion,class,https://w3id.org/dpv/risk#UnwantedCodeDeletion,Unwanted Code Deletion,Something that acts as or causes Unwanted Code Deletion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
+UnwantedDataDeletion,class,https://w3id.org/dpv/risk#UnwantedDataDeletion,Unwanted Data Deletion,Something that acts as or causes Unwanted Data Deletion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
+UnwantedDisclosureData,class,https://w3id.org/dpv/risk#UnwantedDisclosureData,Unwanted Disclosure of Data,Something that acts as or causes Unwanted Disclosure of Data,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
UserRisks,class,https://w3id.org/dpv/risk#UserRisks,User Risks,Concepts associated with risks that arise due to User or Human use,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk
ViolatingCodeOfConduct,class,https://w3id.org/dpv/risk#ViolatingCodeOfConduct,Violating Code of Conduct,Something that acts as or causes Violation of Code of Conduct,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""ViolationCodeConduct"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
ViolatingContractualObligation,class,https://w3id.org/dpv/risk#ViolatingContractualObligation,Violation of Contractual Obligation,Something that acts as or causes Violation of Contractual Obligations,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""ViolationContractualObligations"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
@@ -111,4 +110,3 @@ ViolatingLegalObligation,class,https://w3id.org/dpv/risk#ViolatingLegalObligatio
ViolatingPolicy,class,https://w3id.org/dpv/risk#ViolatingPolicy,Violating Policy,Something that acts as or causes violation of policy which can be either internal or external policy,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,,,risk,https://w3id.org/dpv/risk
ViolatingStatutoryObligations,class,https://w3id.org/dpv/risk#ViolatingStatutoryObligations,Violation of Statutory Obligations,Something that acts as or causes Violation of Statutory Obligations,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""ViolationStatutoryObligations"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
ViolenceAgainstChildren,class,https://w3id.org/dpv/risk#ViolenceAgainstChildren,Violence against children,Something that acts as or causes Child Violence,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,"This concept was called ""ChildViolence"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
-VulnerabilityCreated,class,https://w3id.org/dpv/risk#VulnerabilityCreated,Vulnerability Created,Something that acts as or causes Vulnerability Created,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#InternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk
diff --git a/2.1-dev/risk/modules/risk_consequences.jsonld b/2.1-dev/risk/modules/risk_consequences.jsonld
index cae886467..00f06f02e 100644
--- a/2.1-dev/risk/modules/risk_consequences.jsonld
+++ b/2.1-dev/risk/modules/risk_consequences.jsonld
@@ -1,6 +1,6 @@
[
{
- "@id": "https://w3id.org/dpv/risk#Cryptojacking",
+ "@id": "https://w3id.org/dpv/risk#NonMaterialDamage",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -14,7 +14,7 @@
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
+ "@value": "2022-03-30"
}
],
"http://purl.org/dc/terms/modified": [
@@ -23,11 +23,6 @@
"@value": "2024-08-16"
}
],
- "http://purl.org/dc/terms/source": [
- {
- "@id": "_:Neb960f38438d48258bee0ebae96be48e"
- }
- ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk#"
@@ -41,13 +36,13 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
+ "@id": "https://w3id.org/dpv/risk#LegalRisk"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Cryptojacking"
+ "@value": "Something that acts as or causes Non-Material Damage"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -58,33 +53,40 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Cryptojacking"
- }
- ]
- },
- {
- "@id": "_:Neb960f38438d48258bee0ebae96be48e",
- "@type": [
- "https://schema.org/WebPage"
- ],
- "https://schema.org/name": [
- {
- "@value": "ENISA Threat Landscape 2021"
+ "@value": "Non-Material Damage"
}
],
- "https://schema.org/url": [
+ "http://www.w3.org/2004/02/skos/core#scopeNote": [
{
- "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021"
+ "@language": "en",
+ "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#IntegrityBreach",
+ "@id": "https://w3id.org/dpv/risk#RightsExercisePrevention",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv#RiskConcept"
],
+ "http://purl.org/dc/terms/contributor": [
+ {
+ "@value": "Georg P. Krog, Harshvardhan J. Pandit"
+ }
+ ],
+ "http://purl.org/dc/terms/created": [
+ {
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2022-08-18"
+ }
+ ],
+ "http://purl.org/dc/terms/modified": [
+ {
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2024-08-16"
+ }
+ ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk#"
@@ -98,17 +100,35 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#DataBreach"
+ "@id": "https://w3id.org/dpv/risk#SocietalRisk"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#definition": [
+ {
+ "@language": "en",
+ "@value": "Something that acts as or causes Prevent Exercising of Rights"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
{
"@id": "https://w3id.org/dpv/risk#risk-consequences-classes"
}
+ ],
+ "http://www.w3.org/2004/02/skos/core#prefLabel": [
+ {
+ "@language": "en",
+ "@value": "Prevent Exercising of Rights"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#scopeNote": [
+ {
+ "@language": "en",
+ "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0"
+ }
]
},
{
- "@id": "https://w3id.org/dpv/risk#UnwantedCodeDeletion",
+ "@id": "https://w3id.org/dpv/risk#SystemFailure",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -133,7 +153,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:Nef681cfae64c43969ff8ef7fdde7753a"
+ "@id": "_:Nd794c9a0064e4fe6bb3a0ebd38859b9b"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -149,13 +169,16 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
+ "@id": "https://w3id.org/dpv/risk#AvailabilityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Unwanted Code Deletion"
+ "@value": "Something that acts as or causes System Failure"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -166,28 +189,34 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Unwanted Code Deletion"
+ "@value": "System Failure"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#scopeNote": [
+ {
+ "@language": "en",
+ "@value": "Here system refers to both hardware and software systems"
}
]
},
{
- "@id": "_:Nef681cfae64c43969ff8ef7fdde7753a",
+ "@id": "_:Nd794c9a0064e4fe6bb3a0ebd38859b9b",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments"
+ "@value": "ENISA Threat Landscape for Ransomware Attacks 2022"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment"
+ "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#IllegalDataProcessing",
+ "@id": "https://w3id.org/dpv/risk#Reward",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -195,13 +224,13 @@
],
"http://purl.org/dc/terms/contributor": [
{
- "@value": "Harshvardhan J. Pandit"
+ "@value": "Georg P. Krog, Harshvardhan J. Pandit"
}
],
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
+ "@value": "2024-04-14"
}
],
"http://purl.org/dc/terms/modified": [
@@ -210,11 +239,6 @@
"@value": "2024-08-16"
}
],
- "http://purl.org/dc/terms/source": [
- {
- "@id": "_:N83bd5296b4d94804a73f0e0518c39495"
- }
- ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk#"
@@ -228,13 +252,13 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#LegalRisk"
+ "@id": "https://w3id.org/dpv/risk#FinancialImpact"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Illegal Processing of Data"
+ "@value": "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -245,34 +269,12 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Illegal Data Processing"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#scopeNote": [
- {
- "@language": "en",
- "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0"
- }
- ]
- },
- {
- "@id": "_:N83bd5296b4d94804a73f0e0518c39495",
- "@type": [
- "https://schema.org/WebPage"
- ],
- "https://schema.org/name": [
- {
- "@value": "ISO/IEC 27005:2018"
- }
- ],
- "https://schema.org/url": [
- {
- "@value": "https://www.iso.org/standard/75281.html"
+ "@value": "Reward"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#UserRisks",
+ "@id": "https://w3id.org/dpv/risk#ComponentFailure",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -291,13 +293,16 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv#RiskConcept"
+ "@id": "https://w3id.org/dpv/risk#AvailabilityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Concepts associated with risks that arise due to User or Human use"
+ "@value": "Something that acts as or causes Component Failure"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -308,12 +313,18 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "User Risks"
+ "@value": "Component Failure"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#scopeNote": [
+ {
+ "@language": "en",
+ "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure",
+ "@id": "https://w3id.org/dpv/risk#Harm",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -327,7 +338,7 @@
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
+ "@value": "2022-08-13"
}
],
"http://purl.org/dc/terms/modified": [
@@ -336,11 +347,6 @@
"@value": "2024-08-16"
}
],
- "http://purl.org/dc/terms/source": [
- {
- "@id": "_:N540e39aa17014568ba5a2b03534c1f19"
- }
- ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk#"
@@ -354,13 +360,13 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
+ "@id": "https://w3id.org/dpv/risk#IndividualRisk"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Unauthorised Code Disclosure"
+ "@value": "Something that acts as or causes Harm to humans"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -371,28 +377,18 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Unauthorised Code Disclosure"
- }
- ]
- },
- {
- "@id": "_:N540e39aa17014568ba5a2b03534c1f19",
- "@type": [
- "https://schema.org/WebPage"
- ],
- "https://schema.org/name": [
- {
- "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments"
+ "@value": "Harm"
}
],
- "https://schema.org/url": [
+ "http://www.w3.org/2004/02/skos/core#scopeNote": [
{
- "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment"
+ "@language": "en",
+ "@value": "This concept refers to the general abstract notion of harm"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#ConfidentialityBreach",
+ "@id": "https://w3id.org/dpv/risk#ViolatingEthicsCode",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -417,7 +413,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N804ad242900c474395dd117c74dace8e"
+ "@id": "_:N5971f1bb7e3149b49a4335be11b0926f"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -428,18 +424,18 @@
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
{
"@language": "en",
- "@value": "accepted"
+ "@value": "modified"
}
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#DataBreach"
+ "@id": "https://w3id.org/dpv/risk#LegalRisk"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Confidentiality Breach"
+ "@value": "Something that acts as or causes Violation of Ethics Code"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -450,12 +446,18 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Confidentiality Breach"
+ "@value": "Violating Ethics Code"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#scopeNote": [
+ {
+ "@language": "en",
+ "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0"
}
]
},
{
- "@id": "_:N804ad242900c474395dd117c74dace8e",
+ "@id": "_:N5971f1bb7e3149b49a4335be11b0926f",
"@type": [
"https://schema.org/WebPage"
],
@@ -471,42 +473,7 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk#Privacy",
- "@type": [
- "http://www.w3.org/2004/02/skos/core#Concept",
- "http://www.w3.org/2000/01/rdf-schema#Class",
- "https://w3id.org/dpv#RiskConcept"
- ],
- "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
- {
- "@id": "https://w3id.org/dpv/risk#"
- }
- ],
- "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
- {
- "@language": "en",
- "@value": "accepted"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#broader": [
- {
- "@id": "https://w3id.org/dpv/risk#IndividualRisk"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#inScheme": [
- {
- "@id": "https://w3id.org/dpv/risk#risk-consequences-classes"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#prefLabel": [
- {
- "@language": "en",
- "@value": "Privacy"
- }
- ]
- },
- {
- "@id": "https://w3id.org/dpv/risk#LoseGoodwill",
+ "@id": "https://w3id.org/dpv/risk#UnwantedCodeDeletion",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -531,7 +498,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N4f8237833a8141b2bb3c31cf5176bf42"
+ "@id": "_:N9b03e23aa8864f4288a1885778e3b1e4"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -547,13 +514,19 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#ReputationalRisk"
+ "@id": "https://w3id.org/dpv/risk#IntegrityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#AvailabilityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Loss of Goodwill"
+ "@value": "Something that acts as or causes Unwanted Code Deletion"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -564,28 +537,28 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Lose of Goodwill"
+ "@value": "Unwanted Code Deletion"
}
]
},
{
- "@id": "_:N4f8237833a8141b2bb3c31cf5176bf42",
+ "@id": "_:N9b03e23aa8864f4288a1885778e3b1e4",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ISO/IEC 27005:2018"
+ "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.iso.org/standard/75281.html"
+ "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#ViolatingStatutoryObligations",
+ "@id": "https://w3id.org/dpv/risk#DataCorruption",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -610,7 +583,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:Nb5000792f7ae42ffb4c7efe3b93be7df"
+ "@id": "_:N8aaec0d1fefb4744abcf3099509b1988"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -626,13 +599,16 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#LegalRisk"
+ "@id": "https://w3id.org/dpv/risk#IntegrityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Violation of Statutory Obligations"
+ "@value": "Something that acts as or causes Corruption of Data"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -643,18 +619,18 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Violation of Statutory Obligations"
+ "@value": "Data Corruption"
}
],
"http://www.w3.org/2004/02/skos/core#scopeNote": [
{
"@language": "en",
- "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0"
+ "@value": "This concept was called \"Corruption Data\" in DPV 2.0"
}
]
},
{
- "@id": "_:Nb5000792f7ae42ffb4c7efe3b93be7df",
+ "@id": "_:N8aaec0d1fefb4744abcf3099509b1988",
"@type": [
"https://schema.org/WebPage"
],
@@ -670,56 +646,21 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk#SocietalHealthSafety",
+ "@id": "https://w3id.org/dpv/risk#LoseTrust",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv#RiskConcept"
],
- "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
+ "http://purl.org/dc/terms/contributor": [
{
- "@id": "https://w3id.org/dpv/risk#"
- }
- ],
- "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
- {
- "@language": "en",
- "@value": "accepted"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#broader": [
- {
- "@id": "https://w3id.org/dpv/risk#SocietalRisk"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#inScheme": [
- {
- "@id": "https://w3id.org/dpv/risk#risk-consequences-classes"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#prefLabel": [
- {
- "@language": "en",
- "@value": "Societal Health & Safety"
- }
- ]
- },
- {
- "@id": "https://w3id.org/dpv/risk#Compensation",
- "@type": [
- "http://www.w3.org/2004/02/skos/core#Concept",
- "http://www.w3.org/2000/01/rdf-schema#Class",
- "https://w3id.org/dpv#RiskConcept"
- ],
- "http://purl.org/dc/terms/contributor": [
- {
- "@value": "Georg P. Krog, Harshvardhan J. Pandit"
+ "@value": "Harshvardhan J. Pandit"
}
],
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-04-14"
+ "@value": "2022-08-17"
}
],
"http://purl.org/dc/terms/modified": [
@@ -728,6 +669,11 @@
"@value": "2024-08-16"
}
],
+ "http://purl.org/dc/terms/source": [
+ {
+ "@id": "_:N95b0eaaa71714fb48e2d00a428e03220"
+ }
+ ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk#"
@@ -741,13 +687,13 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#FinancialImpact"
+ "@id": "https://w3id.org/dpv/risk#ReputationalRisk"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms"
+ "@value": "Something that acts as or causes Loss of Trust"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -758,43 +704,28 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Compensation"
+ "@value": "Lose of Trust"
}
]
},
{
- "@id": "https://w3id.org/dpv/examples",
+ "@id": "_:N95b0eaaa71714fb48e2d00a428e03220",
"@type": [
- "http://www.w3.org/ns/dx/prof/ResourceDescriptor"
- ],
- "http://purl.org/dc/terms/conformsTo": [
- {
- "@id": "https://www.w3.org/TR/html/"
- }
- ],
- "http://purl.org/dc/terms/format": [
- {
- "@id": "https://www.iana.org/assignments/media-types/text/html"
- }
- ],
- "http://purl.org/dc/terms/title": [
- {
- "@value": "Examples for Data Privacy Vocabulary"
- }
+ "https://schema.org/WebPage"
],
- "http://www.w3.org/ns/dx/prof/hasArtifact": [
+ "https://schema.org/name": [
{
- "@id": "https://w3id.org/dpv/examples"
+ "@value": "ISO/IEC 27005:2018"
}
],
- "http://www.w3.org/ns/dx/prof/hasRole": [
+ "https://schema.org/url": [
{
- "@id": "http://www.w3.org/ns/dx/prof/role/guidance"
+ "@value": "https://www.iso.org/standard/75281.html"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#ViolatingEthicsCode",
+ "@id": "https://w3id.org/dpv/risk#IllegalDataProcessing",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -819,7 +750,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:Nd8ddc1f8024a4418b62c344837cff0cd"
+ "@id": "_:Nfbea264abf694083a7d1db8b2101092b"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -830,7 +761,7 @@
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
{
"@language": "en",
- "@value": "modified"
+ "@value": "accepted"
}
],
"http://www.w3.org/2004/02/skos/core#broader": [
@@ -841,7 +772,7 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Violation of Ethics Code"
+ "@value": "Something that acts as or causes Illegal Processing of Data"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -852,18 +783,18 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Violating Ethics Code"
+ "@value": "Illegal Data Processing"
}
],
"http://www.w3.org/2004/02/skos/core#scopeNote": [
{
"@language": "en",
- "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0"
+ "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0"
}
]
},
{
- "@id": "_:Nd8ddc1f8024a4418b62c344837cff0cd",
+ "@id": "_:Nfbea264abf694083a7d1db8b2101092b",
"@type": [
"https://schema.org/WebPage"
],
@@ -879,28 +810,28 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk#serialisation-n3",
+ "@id": "https://w3id.org/dpv/risk#serialisation-rdf",
"@type": [
"http://www.w3.org/ns/dx/prof/ResourceDescriptor"
],
"http://purl.org/dc/terms/conformsTo": [
{
- "@id": "https://www.w3.org/TeamSubmission/n3/"
+ "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#"
}
],
"http://purl.org/dc/terms/format": [
{
- "@id": "https://www.iana.org/assignments/media-types/text/n3"
+ "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml"
}
],
"http://purl.org/dc/terms/title": [
{
- "@value": "Risk Concepts - N3 serialiation"
+ "@value": "Risk Concepts - RDF/XML serialiation"
}
],
"http://www.w3.org/ns/dx/prof/hasArtifact": [
{
- "@id": "https://w3id.org/dpv/risk/risk.n3"
+ "@id": "https://w3id.org/dpv/risk/risk.rdf"
}
],
"http://www.w3.org/ns/dx/prof/hasRole": [
@@ -910,7 +841,38 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk#PersonalSafetyEndangerment",
+ "@id": "https://w3id.org/dpv/examples",
+ "@type": [
+ "http://www.w3.org/ns/dx/prof/ResourceDescriptor"
+ ],
+ "http://purl.org/dc/terms/conformsTo": [
+ {
+ "@id": "https://www.w3.org/TR/html/"
+ }
+ ],
+ "http://purl.org/dc/terms/format": [
+ {
+ "@id": "https://www.iana.org/assignments/media-types/text/html"
+ }
+ ],
+ "http://purl.org/dc/terms/title": [
+ {
+ "@value": "Examples for Data Privacy Vocabulary"
+ }
+ ],
+ "http://www.w3.org/ns/dx/prof/hasArtifact": [
+ {
+ "@id": "https://w3id.org/dpv/examples"
+ }
+ ],
+ "http://www.w3.org/ns/dx/prof/hasRole": [
+ {
+ "@id": "http://www.w3.org/ns/dx/prof/role/guidance"
+ }
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#Misuse",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -918,13 +880,13 @@
],
"http://purl.org/dc/terms/contributor": [
{
- "@value": "Harshvardhan J. Pandit"
+ "@value": "Delaram Golpayegani"
}
],
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
+ "@value": "2024-06-11"
}
],
"http://purl.org/dc/terms/modified": [
@@ -933,11 +895,6 @@
"@value": "2024-08-16"
}
],
- "http://purl.org/dc/terms/source": [
- {
- "@id": "_:Na66b6d002d3f448981a58870da1a686e"
- }
- ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk#"
@@ -951,13 +908,13 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#SocietalRisk"
+ "@id": "https://w3id.org/dpv/risk#UserRisks"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Personal Safety Endangerment"
+ "@value": "Something that acts as or causes Misuse"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -968,28 +925,12 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Personal Safety Endangerment"
- }
- ]
- },
- {
- "@id": "_:Na66b6d002d3f448981a58870da1a686e",
- "@type": [
- "https://schema.org/WebPage"
- ],
- "https://schema.org/name": [
- {
- "@value": "ISO/IEC 27005:2018"
- }
- ],
- "https://schema.org/url": [
- {
- "@value": "https://www.iso.org/standard/75281.html"
+ "@value": "Misuse"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#NonMaterialDamage",
+ "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemAccess",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -1003,7 +944,7 @@
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-03-30"
+ "@value": "2022-08-17"
}
],
"http://purl.org/dc/terms/modified": [
@@ -1012,6 +953,11 @@
"@value": "2024-08-16"
}
],
+ "http://purl.org/dc/terms/source": [
+ {
+ "@id": "_:N6fdf74981d95420a82b9c97acf9aa9eb"
+ }
+ ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk#"
@@ -1025,13 +971,19 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#LegalRisk"
+ "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#IntegrityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Non-Material Damage"
+ "@value": "Something that acts as or causes Unauthorised System Access"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -1042,18 +994,28 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Non-Material Damage"
+ "@value": "Unauthorised System Access"
+ }
+ ]
+ },
+ {
+ "@id": "_:N6fdf74981d95420a82b9c97acf9aa9eb",
+ "@type": [
+ "https://schema.org/WebPage"
+ ],
+ "https://schema.org/name": [
+ {
+ "@value": "ISO/IEC 27005:2018"
}
],
- "http://www.w3.org/2004/02/skos/core#scopeNote": [
+ "https://schema.org/url": [
{
- "@language": "en",
- "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms"
+ "@value": "https://www.iso.org/standard/75281.html"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#Injury",
+ "@id": "https://w3id.org/dpv/risk#Coercion",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -1078,7 +1040,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N1ef56bb9fadb431ba4c270603c7acdec"
+ "@id": "_:Nc78302d156fb497aae9594fa63bb9fa7"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -1094,13 +1056,16 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#IndividualRisk"
+ "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Injury"
+ "@value": "Something that acts as or causes Coercion"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -1111,28 +1076,28 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Injury"
+ "@value": "Coercion"
}
]
},
{
- "@id": "_:N1ef56bb9fadb431ba4c270603c7acdec",
+ "@id": "_:Nc78302d156fb497aae9594fa63bb9fa7",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ISO/IEC 27005:2018"
+ "@value": "ENISA Threat Taxonomy 2016"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.iso.org/standard/75281.html"
+ "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#Misuse",
+ "@id": "https://w3id.org/dpv/risk#IdentityFraud",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -1140,13 +1105,13 @@
],
"http://purl.org/dc/terms/contributor": [
{
- "@value": "Delaram Golpayegani"
+ "@value": "Harshvardhan J. Pandit"
}
],
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-06-11"
+ "@value": "2022-08-17"
}
],
"http://purl.org/dc/terms/modified": [
@@ -1155,6 +1120,11 @@
"@value": "2024-08-16"
}
],
+ "http://purl.org/dc/terms/source": [
+ {
+ "@id": "_:Nc74530c53d534886a66e5a7f741398bb"
+ }
+ ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk#"
@@ -1168,13 +1138,16 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#UserRisks"
+ "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Misuse"
+ "@value": "Something that acts as or causes Identity Fraud"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -1185,12 +1158,28 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Misuse"
+ "@value": "Identity Fraud"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#Reward",
+ "@id": "_:Nc74530c53d534886a66e5a7f741398bb",
+ "@type": [
+ "https://schema.org/WebPage"
+ ],
+ "https://schema.org/name": [
+ {
+ "@value": "ENISA Threat Taxonomy 2016"
+ }
+ ],
+ "https://schema.org/url": [
+ {
+ "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view"
+ }
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#LoseNegotiatingCapacity",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -1198,13 +1187,13 @@
],
"http://purl.org/dc/terms/contributor": [
{
- "@value": "Georg P. Krog, Harshvardhan J. Pandit"
+ "@value": "Harshvardhan J. Pandit"
}
],
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-04-14"
+ "@value": "2022-08-17"
}
],
"http://purl.org/dc/terms/modified": [
@@ -1213,6 +1202,11 @@
"@value": "2024-08-16"
}
],
+ "http://purl.org/dc/terms/source": [
+ {
+ "@id": "_:Nf8d97cf300cf44d5881be9535d0b1dff"
+ }
+ ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk#"
@@ -1226,13 +1220,13 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#FinancialImpact"
+ "@id": "https://w3id.org/dpv/risk#ReputationalRisk"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee"
+ "@value": "Something that acts as or causes Loss of Negotiating Capacity"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -1243,26 +1237,42 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Reward"
+ "@value": "Lose of Negotiating Capacity"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#HumanErrors",
+ "@id": "_:Nf8d97cf300cf44d5881be9535d0b1dff",
"@type": [
- "http://www.w3.org/2004/02/skos/core#Concept",
- "http://www.w3.org/2000/01/rdf-schema#Class",
- "https://w3id.org/dpv#RiskConcept"
+ "https://schema.org/WebPage"
],
- "http://purl.org/dc/terms/contributor": [
+ "https://schema.org/name": [
{
- "@value": "Harshvardhan J. Pandit"
+ "@value": "ISO/IEC 27005:2018"
+ }
+ ],
+ "https://schema.org/url": [
+ {
+ "@value": "https://www.iso.org/standard/75281.html"
+ }
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#SocialDisadvantage",
+ "@type": [
+ "http://www.w3.org/2004/02/skos/core#Concept",
+ "http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv#RiskConcept"
+ ],
+ "http://purl.org/dc/terms/contributor": [
+ {
+ "@value": "Georg P. Krog"
}
],
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
+ "@value": "2022-08-19"
}
],
"http://purl.org/dc/terms/modified": [
@@ -1271,11 +1281,6 @@
"@value": "2024-08-16"
}
],
- "http://purl.org/dc/terms/source": [
- {
- "@id": "_:N7d9296887d1d4b6ea986d2ad6579a1ec"
- }
- ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk#"
@@ -1289,13 +1294,13 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#UserRisks"
+ "@id": "https://w3id.org/dpv/risk#SocietalRisk"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Human Errors"
+ "@value": "Something that acts as or causes Social Disadvantage"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -1306,28 +1311,47 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Human Errors"
+ "@value": "Social Disadvantage"
}
]
},
{
- "@id": "_:N7d9296887d1d4b6ea986d2ad6579a1ec",
+ "@id": "https://w3id.org/dpv/risk#PhysicalHarm",
"@type": [
- "https://schema.org/WebPage"
+ "http://www.w3.org/2004/02/skos/core#Concept",
+ "http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv#RiskConcept"
],
- "https://schema.org/name": [
+ "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
- "@value": "ENISA Reference Incident Classification Taxonomy 2018"
+ "@id": "https://w3id.org/dpv/risk#"
}
],
- "https://schema.org/url": [
+ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
{
- "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
+ "@language": "en",
+ "@value": "accepted"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#broader": [
+ {
+ "@id": "https://w3id.org/dpv/risk#IndividualRisk"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#inScheme": [
+ {
+ "@id": "https://w3id.org/dpv/risk#risk-consequences-classes"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#prefLabel": [
+ {
+ "@language": "en",
+ "@value": "Physical Harm"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises",
+ "@id": "https://w3id.org/dpv/risk#Reidentification",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -1341,7 +1365,7 @@
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
+ "@value": "2022-08-19"
}
],
"http://purl.org/dc/terms/modified": [
@@ -1350,11 +1374,6 @@
"@value": "2024-08-16"
}
],
- "http://purl.org/dc/terms/source": [
- {
- "@id": "_:N2b8ae4e96b21406bb91bfdec8f460776"
- }
- ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk#"
@@ -1368,13 +1387,16 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
+ "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Unauthorised Access to Premises"
+ "@value": "Something that acts as or causes Re-identification"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -1385,54 +1407,57 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Unauthorised Access to Premises"
- }
- ]
- },
- {
- "@id": "_:N2b8ae4e96b21406bb91bfdec8f460776",
- "@type": [
- "https://schema.org/WebPage"
- ],
- "https://schema.org/name": [
- {
- "@value": "ISO/IEC 27005:2018"
+ "@value": "Re-identification"
}
],
- "https://schema.org/url": [
+ "http://www.w3.org/2004/02/skos/core#scopeNote": [
{
- "@value": "https://www.iso.org/standard/75281.html"
+ "@language": "en",
+ "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#LoseCustomerConfidence",
+ "@id": "https://w3id.org/dpv/risk#Privacy",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv#RiskConcept"
],
- "http://purl.org/dc/terms/contributor": [
+ "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
- "@value": "Harshvardhan J. Pandit"
+ "@id": "https://w3id.org/dpv/risk#"
}
],
- "http://purl.org/dc/terms/created": [
+ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
{
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
+ "@language": "en",
+ "@value": "accepted"
}
],
- "http://purl.org/dc/terms/modified": [
+ "http://www.w3.org/2004/02/skos/core#broader": [
{
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-08-16"
+ "@id": "https://w3id.org/dpv/risk#IndividualRisk"
}
],
- "http://purl.org/dc/terms/source": [
+ "http://www.w3.org/2004/02/skos/core#inScheme": [
+ {
+ "@id": "https://w3id.org/dpv/risk#risk-consequences-classes"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#prefLabel": [
{
- "@id": "_:N0d138f94265e46f293490fbe0fc8074c"
+ "@language": "en",
+ "@value": "Privacy"
}
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#LegalRisk",
+ "@type": [
+ "http://www.w3.org/2004/02/skos/core#Concept",
+ "http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv#RiskConcept"
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
@@ -1447,13 +1472,13 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#ReputationalRisk"
+ "@id": "https://w3id.org/dpv#RiskConcept"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Loss of Customer Confidence"
+ "@value": "Risks and issues that have their basis in legal requirements and enforcement"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -1464,28 +1489,12 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Lose of Customer Confidence"
- }
- ]
- },
- {
- "@id": "_:N0d138f94265e46f293490fbe0fc8074c",
- "@type": [
- "https://schema.org/WebPage"
- ],
- "https://schema.org/name": [
- {
- "@value": "ISO/IEC 27005:2018"
- }
- ],
- "https://schema.org/url": [
- {
- "@value": "https://www.iso.org/standard/75281.html"
+ "@value": "Legal Risk"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#EquipmentMalfunction",
+ "@id": "https://w3id.org/dpv/risk#SystemIntrusion",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -1510,7 +1519,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N7f1dc230141c4448a99f28f362191020"
+ "@id": "_:Ne8bd9725515e46d0a941f4a4665a7868"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -1526,13 +1535,22 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk"
+ "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#IntegrityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#AvailabilityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Equipment Malfunction"
+ "@value": "Something that acts as or causes System Intrusion"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -1543,34 +1561,28 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Equipment Malfunction"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#scopeNote": [
- {
- "@language": "en",
- "@value": "Here equipment refers to physical equipment"
+ "@value": "System Intrusion"
}
]
},
{
- "@id": "_:N7f1dc230141c4448a99f28f362191020",
+ "@id": "_:Ne8bd9725515e46d0a941f4a4665a7868",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ISO/IEC 27005:2018"
+ "@value": "ENISA Reference Incident Classification Taxonomy 2018"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.iso.org/standard/75281.html"
+ "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#UnauthorisedResourceUse",
+ "@id": "https://w3id.org/dpv/risk#Spoofing",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -1595,7 +1607,10 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:Nd4175f97fd33423f9014c3d690d56fad"
+ "@id": "_:N539160303302464aa341bdfa53068f22"
+ },
+ {
+ "@id": "_:N0085b3ac0b474cf1a64eccdff3718c8d"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -1610,14 +1625,23 @@
}
],
"http://www.w3.org/2004/02/skos/core#broader": [
+ {
+ "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#IntegrityConcept"
+ },
{
"@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Unauthorised Resource Use"
+ "@value": "Something that acts as or causes Spoofing"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -1628,12 +1652,12 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Unauthorised Resource Use"
+ "@value": "Spoofing"
}
]
},
{
- "@id": "_:Nd4175f97fd33423f9014c3d690d56fad",
+ "@id": "_:N539160303302464aa341bdfa53068f22",
"@type": [
"https://schema.org/WebPage"
],
@@ -1649,7 +1673,23 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk#UnauthorisedDataDisclosure",
+ "@id": "_:N0085b3ac0b474cf1a64eccdff3718c8d",
+ "@type": [
+ "https://schema.org/WebPage"
+ ],
+ "https://schema.org/name": [
+ {
+ "@value": "ISO/IEC 27005:2018"
+ }
+ ],
+ "https://schema.org/url": [
+ {
+ "@value": "https://www.iso.org/standard/75281.html"
+ }
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -1674,7 +1714,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:Nf415d60c8c8849ba95e5611d481b06ce"
+ "@id": "_:N7487c570f8f54358874e08fa38c8f27d"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -1689,6 +1729,15 @@
}
],
"http://www.w3.org/2004/02/skos/core#broader": [
+ {
+ "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#IntegrityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#AvailabilityConcept"
+ },
{
"@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
}
@@ -1696,7 +1745,7 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Unauthorised Data Disclosure"
+ "@value": "Something that acts as or causes Unauthorised Access to Premises"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -1707,12 +1756,12 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Unauthorised Data Disclosure"
+ "@value": "Unauthorised Access to Premises"
}
]
},
{
- "@id": "_:Nf415d60c8c8849ba95e5611d481b06ce",
+ "@id": "_:N7487c570f8f54358874e08fa38c8f27d",
"@type": [
"https://schema.org/WebPage"
],
@@ -1728,7 +1777,7 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk#Coercion",
+ "@id": "https://w3id.org/dpv/risk#Discrimination",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -1736,13 +1785,13 @@
],
"http://purl.org/dc/terms/contributor": [
{
- "@value": "Harshvardhan J. Pandit"
+ "@value": "Georg P. Krog"
}
],
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
+ "@value": "2022-08-19"
}
],
"http://purl.org/dc/terms/modified": [
@@ -1751,11 +1800,6 @@
"@value": "2024-08-16"
}
],
- "http://purl.org/dc/terms/source": [
- {
- "@id": "_:N61513676426149faae9e58063eb667d8"
- }
- ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk#"
@@ -1769,13 +1813,13 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
+ "@id": "https://w3id.org/dpv/risk#SocietalRisk"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Coercion"
+ "@value": "Something that acts as or causes Discrimination"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -1786,28 +1830,12 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Coercion"
- }
- ]
- },
- {
- "@id": "_:N61513676426149faae9e58063eb667d8",
- "@type": [
- "https://schema.org/WebPage"
- ],
- "https://schema.org/name": [
- {
- "@value": "ENISA Threat Taxonomy 2016"
- }
- ],
- "https://schema.org/url": [
- {
- "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view"
+ "@value": "Discrimination"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#RightsViolation",
+ "@id": "https://w3id.org/dpv/risk#Compensation",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -1821,7 +1849,7 @@
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-18"
+ "@value": "2024-04-14"
}
],
"http://purl.org/dc/terms/modified": [
@@ -1843,13 +1871,13 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#SocietalRisk"
+ "@id": "https://w3id.org/dpv/risk#FinancialImpact"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Violation of Rights"
+ "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -1860,18 +1888,12 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Violation of Rights"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#scopeNote": [
- {
- "@language": "en",
- "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0"
+ "@value": "Compensation"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#ViolenceAgainstChildren",
+ "@id": "https://w3id.org/dpv/risk#LoseCustomerConfidence",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -1896,7 +1918,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:Nb34535276ddd4a56ac18dcc8fc489cbb"
+ "@id": "_:N669b51dd9b0f4a71983f16dfc274956a"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -1912,13 +1934,13 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#IndividualRisk"
+ "@id": "https://w3id.org/dpv/risk#ReputationalRisk"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Child Violence"
+ "@value": "Something that acts as or causes Loss of Customer Confidence"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -1929,34 +1951,28 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Violence against children"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#scopeNote": [
- {
- "@language": "en",
- "@value": "This concept was called \"ChildViolence\" in DPV 2.0"
+ "@value": "Lose of Customer Confidence"
}
]
},
{
- "@id": "_:Nb34535276ddd4a56ac18dcc8fc489cbb",
+ "@id": "_:N669b51dd9b0f4a71983f16dfc274956a",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ENISA Reference Incident Classification Taxonomy 2018"
+ "@value": "ISO/IEC 27005:2018"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
+ "@value": "https://www.iso.org/standard/75281.html"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#RightsLimitation",
+ "@id": "https://w3id.org/dpv/risk#HumanErrors",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -1964,13 +1980,13 @@
],
"http://purl.org/dc/terms/contributor": [
{
- "@value": "Georg P. Krog, Harshvardhan J. Pandit"
+ "@value": "Harshvardhan J. Pandit"
}
],
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-18"
+ "@value": "2022-08-17"
}
],
"http://purl.org/dc/terms/modified": [
@@ -1979,6 +1995,11 @@
"@value": "2024-08-16"
}
],
+ "http://purl.org/dc/terms/source": [
+ {
+ "@id": "_:Na882c52257364f5896e5b38b50bb08fe"
+ }
+ ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk#"
@@ -1992,13 +2013,13 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#SocietalRisk"
+ "@id": "https://w3id.org/dpv/risk#UserRisks"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Limitation of Rights"
+ "@value": "Something that acts as or causes Human Errors"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -2009,18 +2030,28 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Limitation of Rights"
+ "@value": "Human Errors"
}
+ ]
+ },
+ {
+ "@id": "_:Na882c52257364f5896e5b38b50bb08fe",
+ "@type": [
+ "https://schema.org/WebPage"
],
- "http://www.w3.org/2004/02/skos/core#scopeNote": [
+ "https://schema.org/name": [
{
- "@language": "en",
- "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0"
+ "@value": "ENISA Reference Incident Classification Taxonomy 2018"
+ }
+ ],
+ "https://schema.org/url": [
+ {
+ "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#DistributedDenialServiceAttack",
+ "@id": "https://w3id.org/dpv/risk#Injury",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -2045,7 +2076,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N842f6dd3b92c482180f56ce6a495c382"
+ "@id": "_:Na6c5e17bb8ac4135b62412f66dd88460"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -2061,13 +2092,13 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
+ "@id": "https://w3id.org/dpv/risk#IndividualRisk"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"
+ "@value": "Something that acts as or causes Injury"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -2078,12 +2109,12 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Distributed Denial of Service Attack (DDoS)"
+ "@value": "Injury"
}
]
},
{
- "@id": "_:N842f6dd3b92c482180f56ce6a495c382",
+ "@id": "_:Na6c5e17bb8ac4135b62412f66dd88460",
"@type": [
"https://schema.org/WebPage"
],
@@ -2099,7 +2130,7 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk#UnauthorisedDataAccess",
+ "@id": "https://w3id.org/dpv/risk#ViolatingStatutoryObligations",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -2124,7 +2155,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:Nc799e152712d4ee48d59c2a1366fca7f"
+ "@id": "_:Ne3511d0b904a403e93b1538888ad1023"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -2135,18 +2166,18 @@
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
{
"@language": "en",
- "@value": "accepted"
+ "@value": "modified"
}
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
+ "@id": "https://w3id.org/dpv/risk#LegalRisk"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Unauthorised Data Access"
+ "@value": "Something that acts as or causes Violation of Statutory Obligations"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -2157,69 +2188,34 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Unauthorised Data Access"
- }
- ]
- },
- {
- "@id": "_:Nc799e152712d4ee48d59c2a1366fca7f",
- "@type": [
- "https://schema.org/WebPage"
- ],
- "https://schema.org/name": [
- {
- "@value": "ENISA Reference Incident Classification Taxonomy 2018"
+ "@value": "Violation of Statutory Obligations"
}
],
- "https://schema.org/url": [
+ "http://www.w3.org/2004/02/skos/core#scopeNote": [
{
- "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
+ "@language": "en",
+ "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#JudicialPenalty",
+ "@id": "_:Ne3511d0b904a403e93b1538888ad1023",
"@type": [
- "http://www.w3.org/2004/02/skos/core#Concept",
- "http://www.w3.org/2000/01/rdf-schema#Class",
- "https://w3id.org/dpv#RiskConcept"
- ],
- "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
- {
- "@id": "https://w3id.org/dpv/risk#"
- }
- ],
- "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
- {
- "@language": "en",
- "@value": "accepted"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#broader": [
- {
- "@id": "https://w3id.org/dpv/risk#FinancialImpact"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#definition": [
- {
- "@language": "en",
- "@value": "Something that involves or causes judicial penalties to be paid"
- }
+ "https://schema.org/WebPage"
],
- "http://www.w3.org/2004/02/skos/core#inScheme": [
+ "https://schema.org/name": [
{
- "@id": "https://w3id.org/dpv/risk#risk-consequences-classes"
+ "@value": "ISO/IEC 27005:2018"
}
],
- "http://www.w3.org/2004/02/skos/core#prefLabel": [
+ "https://schema.org/url": [
{
- "@language": "en",
- "@value": "Judicial Penalty"
+ "@value": "https://www.iso.org/standard/75281.html"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemAccess",
+ "@id": "https://w3id.org/dpv/risk#RightsImpact",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -2244,7 +2240,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N4387faf4bb854435bfdc47ebf666782a"
+ "@id": "_:N7b552ef83c274f84b167cc68c23676bb"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -2260,13 +2256,16 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
+ "@id": "https://w3id.org/dpv/risk#SocietalRisk"
+ },
+ {
+ "@id": "https://w3id.org/dpv#Impact"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Unauthorised System Access"
+ "@value": "Something that acts as or causes Impact to Rights"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -2277,12 +2276,18 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Unauthorised System Access"
+ "@value": "Impact to Rights"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#scopeNote": [
+ {
+ "@language": "en",
+ "@value": "This concept was called \"ImpactToRights\" in DPV 2.0"
}
]
},
{
- "@id": "_:N4387faf4bb854435bfdc47ebf666782a",
+ "@id": "_:N7b552ef83c274f84b167cc68c23676bb",
"@type": [
"https://schema.org/WebPage"
],
@@ -2298,33 +2303,46 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk#SecurityBreach",
+ "@id": "https://w3id.org/dpv/risk#IndividualHealthSafety",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv#RiskConcept"
],
- "http://purl.org/dc/terms/contributor": [
+ "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
- "@value": "Harshvardhan J. Pandit"
+ "@id": "https://w3id.org/dpv/risk#"
}
],
- "http://purl.org/dc/terms/created": [
+ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
{
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
+ "@language": "en",
+ "@value": "accepted"
}
],
- "http://purl.org/dc/terms/modified": [
+ "http://www.w3.org/2004/02/skos/core#broader": [
{
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-08-16"
+ "@id": "https://w3id.org/dpv/risk#IndividualRisk"
}
],
- "http://purl.org/dc/terms/source": [
+ "http://www.w3.org/2004/02/skos/core#inScheme": [
{
- "@id": "_:Nee086e9da9f643e2837c115c27f1cabc"
+ "@id": "https://w3id.org/dpv/risk#risk-consequences-classes"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#prefLabel": [
+ {
+ "@language": "en",
+ "@value": "Individual Health & Safety"
}
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#ReputationalRisk",
+ "@type": [
+ "http://www.w3.org/2004/02/skos/core#Concept",
+ "http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv#RiskConcept"
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
@@ -2339,13 +2357,13 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk"
+ "@id": "https://w3id.org/dpv#RiskConcept"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Security Breach"
+ "@value": "Risks and issues that affect the reputation of the organisation"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -2356,55 +2374,17 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Security Breach"
- }
- ]
- },
- {
- "@id": "_:Nee086e9da9f643e2837c115c27f1cabc",
- "@type": [
- "https://schema.org/WebPage"
- ],
- "https://schema.org/name": [
- {
- "@value": "ISO/IEC 27005:2018"
- }
- ],
- "https://schema.org/url": [
- {
- "@value": "https://www.iso.org/standard/75281.html"
+ "@value": "Reputational Risk"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#SexualViolence",
+ "@id": "https://w3id.org/dpv/risk#ViolatingPolicy",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv#RiskConcept"
],
- "http://purl.org/dc/terms/contributor": [
- {
- "@value": "Harshvardhan J. Pandit"
- }
- ],
- "http://purl.org/dc/terms/created": [
- {
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
- }
- ],
- "http://purl.org/dc/terms/modified": [
- {
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-08-16"
- }
- ],
- "http://purl.org/dc/terms/source": [
- {
- "@id": "_:Nbeddee22b7a841e39879764ab63949f8"
- }
- ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk#"
@@ -2418,13 +2398,13 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#IndividualRisk"
+ "@id": "https://w3id.org/dpv/risk#LegalRisk"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Sexual Violence"
+ "@value": "Something that acts as or causes violation of policy which can be either internal or external policy"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -2435,28 +2415,12 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Sexual Violence"
- }
- ]
- },
- {
- "@id": "_:Nbeddee22b7a841e39879764ab63949f8",
- "@type": [
- "https://schema.org/WebPage"
- ],
- "https://schema.org/name": [
- {
- "@value": "ENISA Reference Incident Classification Taxonomy 2018"
- }
- ],
- "https://schema.org/url": [
- {
- "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
+ "@value": "Violating Policy"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemModification",
+ "@id": "https://w3id.org/dpv/risk#InterceptCommunications",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -2481,7 +2445,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N0c47798cd08a44d790a99ee3c58dcfb9"
+ "@id": "_:N1f36b972c50f49fb9b474152b57cf474"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -2492,10 +2456,13 @@
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
{
"@language": "en",
- "@value": "accepted"
+ "@value": "modified"
}
],
"http://www.w3.org/2004/02/skos/core#broader": [
+ {
+ "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept"
+ },
{
"@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
}
@@ -2503,7 +2470,7 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Unauthorised System Modification"
+ "@value": "Something that acts as or causes Interception of Communications"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -2514,54 +2481,79 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Unauthorised System Modification"
+ "@value": "Intercept Communications"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#scopeNote": [
+ {
+ "@language": "en",
+ "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0"
}
]
},
{
- "@id": "_:N0c47798cd08a44d790a99ee3c58dcfb9",
+ "@id": "_:N1f36b972c50f49fb9b474152b57cf474",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments"
+ "@value": "ISO/IEC 27005:2018"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment"
+ "@value": "https://www.iso.org/standard/75281.html"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#UnwantedDataDeletion",
+ "@id": "https://w3id.org/dpv/risk#JudicialPenalty",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv#RiskConcept"
],
- "http://purl.org/dc/terms/contributor": [
+ "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
- "@value": "Harshvardhan J. Pandit"
+ "@id": "https://w3id.org/dpv/risk#"
}
],
- "http://purl.org/dc/terms/created": [
+ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
{
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
+ "@language": "en",
+ "@value": "accepted"
}
],
- "http://purl.org/dc/terms/modified": [
+ "http://www.w3.org/2004/02/skos/core#broader": [
{
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-08-16"
+ "@id": "https://w3id.org/dpv/risk#FinancialImpact"
}
],
- "http://purl.org/dc/terms/source": [
+ "http://www.w3.org/2004/02/skos/core#definition": [
+ {
+ "@language": "en",
+ "@value": "Something that involves or causes judicial penalties to be paid"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#inScheme": [
+ {
+ "@id": "https://w3id.org/dpv/risk#risk-consequences-classes"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#prefLabel": [
{
- "@id": "_:N7ff2bed0d152400e90aff3c52f1320b0"
+ "@language": "en",
+ "@value": "Judicial Penalty"
}
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#AccidentalMisuse",
+ "@type": [
+ "http://www.w3.org/2004/02/skos/core#Concept",
+ "http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv#RiskConcept"
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
@@ -2576,13 +2568,13 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
+ "@id": "https://w3id.org/dpv/risk#UserRisks"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Unwanted Data Deletion"
+ "@value": "Accidental Misuse"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -2593,28 +2585,53 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Unwanted Data Deletion"
+ "@value": "Accidental Misuse"
}
]
},
{
- "@id": "_:N7ff2bed0d152400e90aff3c52f1320b0",
+ "@id": "https://w3id.org/dpv/risk#EnvironmentalRisk",
"@type": [
- "https://schema.org/WebPage"
+ "http://www.w3.org/2004/02/skos/core#Concept",
+ "http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv#RiskConcept"
],
- "https://schema.org/name": [
+ "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
- "@value": "ISO/IEC 27005:2018"
+ "@id": "https://w3id.org/dpv/risk#"
}
],
- "https://schema.org/url": [
+ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
{
- "@value": "https://www.iso.org/standard/75281.html"
+ "@language": "en",
+ "@value": "accepted"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#broader": [
+ {
+ "@id": "https://w3id.org/dpv#RiskConcept"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#definition": [
+ {
+ "@language": "en",
+ "@value": "Risks and issues that have their origin in environment or can affect the environment at large"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#inScheme": [
+ {
+ "@id": "https://w3id.org/dpv/risk#risk-consequences-classes"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#prefLabel": [
+ {
+ "@language": "en",
+ "@value": "Environmental Risk"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#Spoofing",
+ "@id": "https://w3id.org/dpv/risk#Extorsion",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -2639,10 +2656,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N603a4b8fadf24d23ac9c224927644c9d"
- },
- {
- "@id": "_:N698cebdfba864777b23d25052c4d2493"
+ "@id": "_:N78e6085a5a4a4a08adbcdb4af46722d9"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -2658,16 +2672,16 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
+ "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept"
},
{
- "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk"
+ "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Spoofing"
+ "@value": "Something that acts as or causes Extorsion"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -2678,44 +2692,89 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Spoofing"
+ "@value": "Extorsion"
}
]
},
{
- "@id": "_:N603a4b8fadf24d23ac9c224927644c9d",
+ "@id": "_:N78e6085a5a4a4a08adbcdb4af46722d9",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ISO/IEC 27005:2018"
+ "@value": "ENISA Threat Taxonomy 2016"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.iso.org/standard/75281.html"
+ "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view"
}
]
},
{
- "@id": "_:N698cebdfba864777b23d25052c4d2493",
+ "@id": "https://w3id.org/dpv/risk#UnauthorisedReidentification",
"@type": [
- "https://schema.org/WebPage"
+ "http://www.w3.org/2004/02/skos/core#Concept",
+ "http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv#RiskConcept"
],
- "https://schema.org/name": [
+ "http://purl.org/dc/terms/contributor": [
{
- "@value": "ISO/IEC 27005:2018"
+ "@value": "Georg P. Krog"
}
],
- "https://schema.org/url": [
+ "http://purl.org/dc/terms/created": [
{
- "@value": "https://www.iso.org/standard/75281.html"
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2022-08-19"
+ }
+ ],
+ "http://purl.org/dc/terms/modified": [
+ {
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2024-08-16"
+ }
+ ],
+ "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
+ {
+ "@id": "https://w3id.org/dpv/risk#"
+ }
+ ],
+ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
+ {
+ "@language": "en",
+ "@value": "accepted"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#broader": [
+ {
+ "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#definition": [
+ {
+ "@language": "en",
+ "@value": "Something that acts as or causes Unauthorised Re-Identification"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#inScheme": [
+ {
+ "@id": "https://w3id.org/dpv/risk#risk-consequences-classes"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#prefLabel": [
+ {
+ "@language": "en",
+ "@value": "Unauthorised Re-Identification"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#ExposureToHarmfulSpeech",
+ "@id": "https://w3id.org/dpv/risk#ConfidentialityBreach",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -2740,7 +2799,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:Ne595b225e5ee4cc2b2374256ef05fa2e"
+ "@id": "_:N0571680fc6554da2a384a2e851d510c0"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -2756,13 +2815,16 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#SocietalRisk"
+ "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#DataBreach"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Harmful Speech"
+ "@value": "Something that acts as or causes Confidentiality Breach"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -2773,70 +2835,96 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Exposure to Harmful Speech"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#scopeNote": [
- {
- "@language": "en",
- "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0"
+ "@value": "Confidentiality Breach"
}
]
},
{
- "@id": "_:Ne595b225e5ee4cc2b2374256ef05fa2e",
+ "@id": "_:N0571680fc6554da2a384a2e851d510c0",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ENISA Reference Incident Classification Taxonomy 2018"
+ "@value": "ISO/IEC 27005:2018"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
+ "@value": "https://www.iso.org/standard/75281.html"
}
]
},
{
- "@id": "https://w3id.org/dpv/guides",
+ "@id": "https://w3id.org/dpv/risk#FinancialImpact",
"@type": [
- "http://www.w3.org/ns/dx/prof/ResourceDescriptor"
+ "http://www.w3.org/2004/02/skos/core#Concept",
+ "http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv#RiskConcept"
],
- "http://purl.org/dc/terms/conformsTo": [
+ "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
- "@id": "https://www.w3.org/TR/html/"
+ "@id": "https://w3id.org/dpv/risk#"
}
],
- "http://purl.org/dc/terms/format": [
+ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
{
- "@id": "https://www.iana.org/assignments/media-types/text/html"
+ "@language": "en",
+ "@value": "accepted"
}
],
- "http://purl.org/dc/terms/title": [
+ "http://www.w3.org/2004/02/skos/core#broader": [
{
- "@value": "Guides for Data Privacy Vocabulary"
+ "@id": "https://w3id.org/dpv#RiskConcept"
}
],
- "http://www.w3.org/ns/dx/prof/hasArtifact": [
+ "http://www.w3.org/2004/02/skos/core#definition": [
{
- "@id": "https://w3id.org/dpv/guides"
+ "@language": "en",
+ "@value": "Things that cause or have the potential to impact financial resources"
}
],
- "http://www.w3.org/ns/dx/prof/hasRole": [
+ "http://www.w3.org/2004/02/skos/core#inScheme": [
{
- "@id": "http://www.w3.org/ns/dx/prof/role/guidance"
+ "@id": "https://w3id.org/dpv/risk#risk-consequences-classes"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#prefLabel": [
+ {
+ "@language": "en",
+ "@value": "Financial Impact"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#InternalSecurityThreat",
+ "@id": "https://w3id.org/dpv/risk#Terrorism",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv#RiskConcept"
],
+ "http://purl.org/dc/terms/contributor": [
+ {
+ "@value": "Harshvardhan J. Pandit"
+ }
+ ],
+ "http://purl.org/dc/terms/created": [
+ {
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2022-08-17"
+ }
+ ],
+ "http://purl.org/dc/terms/modified": [
+ {
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2024-08-16"
+ }
+ ],
+ "http://purl.org/dc/terms/source": [
+ {
+ "@id": "_:N84e706a33b7c462194d2c8fb5c04326c"
+ }
+ ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk#"
@@ -2850,13 +2938,13 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv#RiskConcept"
+ "@id": "https://w3id.org/dpv/risk#SocietalRisk"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Concepts associated with security threats and issues that originate within the organisation"
+ "@value": "Something that acts as or causes Terrorism"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -2867,79 +2955,134 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Internal Security Threat"
+ "@value": "Terrorism"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#serialisation-ttl",
+ "@id": "_:N84e706a33b7c462194d2c8fb5c04326c",
"@type": [
- "http://www.w3.org/ns/dx/prof/ResourceDescriptor"
+ "https://schema.org/WebPage"
],
- "http://purl.org/dc/terms/conformsTo": [
+ "https://schema.org/name": [
{
- "@id": "https://www.w3.org/TR/turtle/"
+ "@value": "ISO/IEC 27005:2018"
}
],
- "http://purl.org/dc/terms/format": [
+ "https://schema.org/url": [
{
- "@id": "https://www.iana.org/assignments/media-types/text/turtle"
+ "@value": "https://www.iso.org/standard/75281.html"
}
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#PublicOrderBreach",
+ "@type": [
+ "http://www.w3.org/2004/02/skos/core#Concept",
+ "http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv#RiskConcept"
],
- "http://purl.org/dc/terms/title": [
+ "http://purl.org/dc/terms/contributor": [
{
- "@value": "Risk Concepts - Turtle serialiation"
+ "@value": "Harshvardhan J. Pandit"
}
],
- "http://www.w3.org/ns/dx/prof/hasArtifact": [
+ "http://purl.org/dc/terms/created": [
{
- "@id": "https://w3id.org/dpv/risk/risk.ttl"
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2022-08-17"
}
],
- "http://www.w3.org/ns/dx/prof/hasRole": [
+ "http://purl.org/dc/terms/modified": [
{
- "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary"
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2024-08-16"
}
- ]
- },
- {
- "@id": "https://w3id.org/dpv/risk#serialisation-jsonld",
- "@type": [
- "http://www.w3.org/ns/dx/prof/ResourceDescriptor"
],
- "http://purl.org/dc/terms/conformsTo": [
+ "http://purl.org/dc/terms/source": [
{
- "@id": "https://www.w3.org/TR/json-ld11/"
+ "@id": "_:N1d102af8ecd94ce3a875a9a2a7e78bcc"
}
],
- "http://purl.org/dc/terms/format": [
+ "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
- "@id": "https://www.iana.org/assignments/media-types/application/ld+json"
+ "@id": "https://w3id.org/dpv/risk#"
}
],
- "http://purl.org/dc/terms/title": [
+ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
{
- "@value": "Risk Concepts - JSON-LD serialiation"
+ "@language": "en",
+ "@value": "accepted"
}
],
- "http://www.w3.org/ns/dx/prof/hasArtifact": [
+ "http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk/risk.jsonld"
+ "@id": "https://w3id.org/dpv/risk#LegalRisk"
}
],
- "http://www.w3.org/ns/dx/prof/hasRole": [
+ "http://www.w3.org/2004/02/skos/core#definition": [
{
- "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary"
+ "@language": "en",
+ "@value": "Something that acts as or causes Public Order Breach"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#inScheme": [
+ {
+ "@id": "https://w3id.org/dpv/risk#risk-consequences-classes"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#prefLabel": [
+ {
+ "@language": "en",
+ "@value": "Public Order Breach"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#LegalRisk",
+ "@id": "_:N1d102af8ecd94ce3a875a9a2a7e78bcc",
+ "@type": [
+ "https://schema.org/WebPage"
+ ],
+ "https://schema.org/name": [
+ {
+ "@value": "ISO/IEC 27005:2018"
+ }
+ ],
+ "https://schema.org/url": [
+ {
+ "@value": "https://www.iso.org/standard/75281.html"
+ }
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#UnwantedDataDeletion",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv#RiskConcept"
],
+ "http://purl.org/dc/terms/contributor": [
+ {
+ "@value": "Harshvardhan J. Pandit"
+ }
+ ],
+ "http://purl.org/dc/terms/created": [
+ {
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2022-08-17"
+ }
+ ],
+ "http://purl.org/dc/terms/modified": [
+ {
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2024-08-16"
+ }
+ ],
+ "http://purl.org/dc/terms/source": [
+ {
+ "@id": "_:Nde382e9a51c445d69476b298827b1cbe"
+ }
+ ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk#"
@@ -2953,13 +3096,19 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv#RiskConcept"
+ "@id": "https://w3id.org/dpv/risk#IntegrityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#AvailabilityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Risks and issues that have their basis in legal requirements and enforcement"
+ "@value": "Something that acts as or causes Unwanted Data Deletion"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -2970,12 +3119,28 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Legal Risk"
+ "@value": "Unwanted Data Deletion"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#SystemFailure",
+ "@id": "_:Nde382e9a51c445d69476b298827b1cbe",
+ "@type": [
+ "https://schema.org/WebPage"
+ ],
+ "https://schema.org/name": [
+ {
+ "@value": "ISO/IEC 27005:2018"
+ }
+ ],
+ "https://schema.org/url": [
+ {
+ "@value": "https://www.iso.org/standard/75281.html"
+ }
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#ErroneousSystemUse",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -3000,7 +3165,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:Ndb0e0e85d6ad4dabbf9efc7a0f2cb59a"
+ "@id": "_:N258e312c37aa4354bed73603ef7a36f6"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -3016,13 +3181,13 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk"
+ "@id": "https://w3id.org/dpv/risk#UserRisks"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes System Failure"
+ "@value": "Something that acts as or causes Erroneous System Use"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -3033,34 +3198,28 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "System Failure"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#scopeNote": [
- {
- "@language": "en",
- "@value": "Here system refers to both hardware and software systems"
+ "@value": "Erroneous System Use"
}
]
},
{
- "@id": "_:Ndb0e0e85d6ad4dabbf9efc7a0f2cb59a",
+ "@id": "_:N258e312c37aa4354bed73603ef7a36f6",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ENISA Threat Landscape for Ransomware Attacks 2022"
+ "@value": "ISO/IEC 27005:2018"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks"
+ "@value": "https://www.iso.org/standard/75281.html"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeModification",
+ "@id": "https://w3id.org/dpv/risk#Cryptojacking",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -3085,7 +3244,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N8ae12eb2b96a4c7e97a8739ee00ffe80"
+ "@id": "_:N3adf839933da482c89a2828fc9743969"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -3100,6 +3259,9 @@
}
],
"http://www.w3.org/2004/02/skos/core#broader": [
+ {
+ "@id": "https://w3id.org/dpv/risk#AvailabilityConcept"
+ },
{
"@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
}
@@ -3107,7 +3269,7 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Unauthorised Code Modification"
+ "@value": "Something that acts as or causes Cryptojacking"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -3118,33 +3280,56 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Unauthorised Code Modification"
+ "@value": "Cryptojacking"
}
]
},
{
- "@id": "_:N8ae12eb2b96a4c7e97a8739ee00ffe80",
+ "@id": "_:N3adf839933da482c89a2828fc9743969",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments"
+ "@value": "ENISA Threat Landscape 2021"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment"
+ "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#JudicialCosts",
+ "@id": "https://w3id.org/dpv/risk#Fee",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv#RiskConcept"
],
+ "http://purl.org/dc/terms/contributor": [
+ {
+ "@value": "Georg P. Krog, Harshvardhan J. Pandit"
+ }
+ ],
+ "http://purl.org/dc/terms/created": [
+ {
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2024-04-14"
+ }
+ ],
+ "http://purl.org/dc/terms/modified": [
+ {
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2024-08-16"
+ }
+ ],
+ "http://purl.org/dc/terms/source": [
+ {
+ "@language": "en",
+ "@value": "DGA 2.10"
+ }
+ ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk#"
@@ -3153,7 +3338,7 @@
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
{
"@language": "en",
- "@value": "accepted"
+ "@value": "modified"
}
],
"http://www.w3.org/2004/02/skos/core#broader": [
@@ -3164,7 +3349,7 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that involves or causes judicial costs to be paid"
+ "@value": "Something that acts as or provides fees e.g. for using a service"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -3175,12 +3360,12 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Judicial Costs"
+ "@value": "Fee"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#PublicOrderBreach",
+ "@id": "https://w3id.org/dpv/risk#LoseCredibility",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -3205,7 +3390,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N2bd2812bbacb46319d2bdb0e95e02f65"
+ "@id": "_:N2c068c379d9b4c2b8da0937ad8be6a81"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -3221,13 +3406,13 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#LegalRisk"
+ "@id": "https://w3id.org/dpv/risk#ReputationalRisk"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Public Order Breach"
+ "@value": "Something that acts as or causes Loss of Credibility"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -3238,12 +3423,12 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Public Order Breach"
+ "@value": "Lose of Credibility"
}
]
},
{
- "@id": "_:N2bd2812bbacb46319d2bdb0e95e02f65",
+ "@id": "_:N2c068c379d9b4c2b8da0937ad8be6a81",
"@type": [
"https://schema.org/WebPage"
],
@@ -3259,7 +3444,7 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk#MaterialDamage",
+ "@id": "https://w3id.org/dpv/risk#ViolatingLegalObligation",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -3273,7 +3458,7 @@
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-03-30"
+ "@value": "2022-08-17"
}
],
"http://purl.org/dc/terms/modified": [
@@ -3282,6 +3467,11 @@
"@value": "2024-08-16"
}
],
+ "http://purl.org/dc/terms/source": [
+ {
+ "@id": "_:N0b5dd4cc254540f49140434e86708abb"
+ }
+ ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk#"
@@ -3290,7 +3480,7 @@
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
{
"@language": "en",
- "@value": "accepted"
+ "@value": "modified"
}
],
"http://www.w3.org/2004/02/skos/core#broader": [
@@ -3301,7 +3491,7 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Material Damage"
+ "@value": "Something that acts as or causes Violation of Legal Obligations"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -3312,18 +3502,34 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Material Damage"
+ "@value": "Violation of Legal Obligations"
}
],
"http://www.w3.org/2004/02/skos/core#scopeNote": [
{
"@language": "en",
- "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms"
+ "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#DataCorruption",
+ "@id": "_:N0b5dd4cc254540f49140434e86708abb",
+ "@type": [
+ "https://schema.org/WebPage"
+ ],
+ "https://schema.org/name": [
+ {
+ "@value": "ISO/IEC 27005:2018"
+ }
+ ],
+ "https://schema.org/url": [
+ {
+ "@value": "https://www.iso.org/standard/75281.html"
+ }
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#FinancialLoss",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -3348,7 +3554,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:Ncd7b81f0daef4263a47284ebb48b83f6"
+ "@id": "_:N698d6b9272804e2dba685b14f6e69152"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -3359,18 +3565,18 @@
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
{
"@language": "en",
- "@value": "modified"
+ "@value": "accepted"
}
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk"
+ "@id": "https://w3id.org/dpv/risk#FinancialImpact"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Corruption of Data"
+ "@value": "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -3381,18 +3587,12 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Data Corruption"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#scopeNote": [
- {
- "@language": "en",
- "@value": "This concept was called \"Corruption Data\" in DPV 2.0"
+ "@value": "Financial Loss"
}
]
},
{
- "@id": "_:Ncd7b81f0daef4263a47284ebb48b83f6",
+ "@id": "_:N698d6b9272804e2dba685b14f6e69152",
"@type": [
"https://schema.org/WebPage"
],
@@ -3408,66 +3608,35 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk#serialisation-rdf",
+ "@id": "https://w3id.org/dpv/risk#ExposureToHarmfulSpeech",
"@type": [
- "http://www.w3.org/ns/dx/prof/ResourceDescriptor"
+ "http://www.w3.org/2004/02/skos/core#Concept",
+ "http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv#RiskConcept"
],
- "http://purl.org/dc/terms/conformsTo": [
+ "http://purl.org/dc/terms/contributor": [
{
- "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#"
+ "@value": "Harshvardhan J. Pandit"
}
],
- "http://purl.org/dc/terms/format": [
+ "http://purl.org/dc/terms/created": [
{
- "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml"
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2022-08-17"
}
],
- "http://purl.org/dc/terms/title": [
+ "http://purl.org/dc/terms/modified": [
{
- "@value": "Risk Concepts - RDF/XML serialiation"
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2024-08-16"
}
],
- "http://www.w3.org/ns/dx/prof/hasArtifact": [
+ "http://purl.org/dc/terms/source": [
{
- "@id": "https://w3id.org/dpv/risk/risk.rdf"
+ "@id": "_:N95f46ba999c74717949420ed05a75570"
}
],
- "http://www.w3.org/ns/dx/prof/hasRole": [
- {
- "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary"
- }
- ]
- },
- {
- "@id": "https://w3id.org/dpv/risk#CompromiseAccountCredentials",
- "@type": [
- "http://www.w3.org/2004/02/skos/core#Concept",
- "http://www.w3.org/2000/01/rdf-schema#Class",
- "https://w3id.org/dpv#RiskConcept"
- ],
- "http://purl.org/dc/terms/contributor": [
- {
- "@value": "Harshvardhan J. Pandit"
- }
- ],
- "http://purl.org/dc/terms/created": [
- {
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
- }
- ],
- "http://purl.org/dc/terms/modified": [
- {
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-08-16"
- }
- ],
- "http://purl.org/dc/terms/source": [
- {
- "@id": "_:Nf877665a169e4a7eac29964fc15db245"
- }
- ],
- "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
+ "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk#"
}
@@ -3480,13 +3649,13 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk"
+ "@id": "https://w3id.org/dpv/risk#SocietalRisk"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Account Credentials to be compromised"
+ "@value": "Something that acts as or causes Harmful Speech"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -3497,12 +3666,18 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Compromise Account Credentials"
+ "@value": "Exposure to Harmful Speech"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#scopeNote": [
+ {
+ "@language": "en",
+ "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0"
}
]
},
{
- "@id": "_:Nf877665a169e4a7eac29964fc15db245",
+ "@id": "_:N95f46ba999c74717949420ed05a75570",
"@type": [
"https://schema.org/WebPage"
],
@@ -3518,48 +3693,7 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk#ReputationalRisk",
- "@type": [
- "http://www.w3.org/2004/02/skos/core#Concept",
- "http://www.w3.org/2000/01/rdf-schema#Class",
- "https://w3id.org/dpv#RiskConcept"
- ],
- "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
- {
- "@id": "https://w3id.org/dpv/risk#"
- }
- ],
- "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
- {
- "@language": "en",
- "@value": "accepted"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#broader": [
- {
- "@id": "https://w3id.org/dpv#RiskConcept"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#definition": [
- {
- "@language": "en",
- "@value": "Risks and issues that affect the reputation of the organisation"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#inScheme": [
- {
- "@id": "https://w3id.org/dpv/risk#risk-consequences-classes"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#prefLabel": [
- {
- "@language": "en",
- "@value": "Reputational Risk"
- }
- ]
- },
- {
- "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeAccess",
+ "@id": "https://w3id.org/dpv/risk#SystemMalfunction",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -3584,7 +3718,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N8193907d23bd43dc8b146573989b8a0d"
+ "@id": "_:N18aeaa08367a4c56822793249e34feae"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -3600,13 +3734,16 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
+ "@id": "https://w3id.org/dpv/risk#AvailabilityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Unauthorised Code Access"
+ "@value": "Something that acts as or causes System Malfunction"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -3617,28 +3754,34 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Unauthorised Code Access"
+ "@value": "System Malfunction"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#scopeNote": [
+ {
+ "@language": "en",
+ "@value": "Here system refers to both hardware and software systems"
}
]
},
{
- "@id": "_:N8193907d23bd43dc8b146573989b8a0d",
+ "@id": "_:N18aeaa08367a4c56822793249e34feae",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments"
+ "@value": "ISO/IEC 27005:2018"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment"
+ "@value": "https://www.iso.org/standard/75281.html"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#AuthorisationFailure",
+ "@id": "https://w3id.org/dpv/risk#SecurityBreach",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -3663,7 +3806,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N8906a1d2a7bd4484854e88a2dc1b93a5"
+ "@id": "_:Nb3034bc7cf1e485b85582c21529ebaa4"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -3678,6 +3821,15 @@
}
],
"http://www.w3.org/2004/02/skos/core#broader": [
+ {
+ "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#IntegrityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#AvailabilityConcept"
+ },
{
"@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk"
}
@@ -3685,7 +3837,7 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Authorisation Failure"
+ "@value": "Something that acts as or causes Security Breach"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -3696,34 +3848,60 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Authorisation Failure"
+ "@value": "Security Breach"
}
]
},
{
- "@id": "_:N8906a1d2a7bd4484854e88a2dc1b93a5",
+ "@id": "_:Nb3034bc7cf1e485b85582c21529ebaa4",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ENISa Trust Services Security Incidents 2021"
+ "@value": "ISO/IEC 27005:2018"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021"
+ "@value": "https://www.iso.org/standard/75281.html"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#risk-consequences-classes",
+ "@id": "https://w3id.org/dpv/risk#IntegrityBreach",
"@type": [
- "http://www.w3.org/2004/02/skos/core#ConceptScheme"
+ "http://www.w3.org/2004/02/skos/core#Concept",
+ "http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv#RiskConcept"
+ ],
+ "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
+ {
+ "@id": "https://w3id.org/dpv/risk#"
+ }
+ ],
+ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
+ {
+ "@language": "en",
+ "@value": "accepted"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#broader": [
+ {
+ "@id": "https://w3id.org/dpv/risk#IntegrityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#DataBreach"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#inScheme": [
+ {
+ "@id": "https://w3id.org/dpv/risk#risk-consequences-classes"
+ }
]
},
{
- "@id": "https://w3id.org/dpv/risk#SystemMalfunction",
+ "@id": "https://w3id.org/dpv/risk#ViolenceAgainstChildren",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -3748,7 +3926,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N1c2325e64024454ebc2e79f9e388cf3b"
+ "@id": "_:N50def33314ee4442bf7e77161e51165b"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -3764,13 +3942,13 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk"
+ "@id": "https://w3id.org/dpv/risk#IndividualRisk"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes System Malfunction"
+ "@value": "Something that acts as or causes Child Violence"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -3781,56 +3959,39 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "System Malfunction"
+ "@value": "Violence against children"
}
],
"http://www.w3.org/2004/02/skos/core#scopeNote": [
{
"@language": "en",
- "@value": "Here system refers to both hardware and software systems"
+ "@value": "This concept was called \"ChildViolence\" in DPV 2.0"
}
]
},
{
- "@id": "_:N1c2325e64024454ebc2e79f9e388cf3b",
+ "@id": "_:N50def33314ee4442bf7e77161e51165b",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ISO/IEC 27005:2018"
+ "@value": "ENISA Reference Incident Classification Taxonomy 2018"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.iso.org/standard/75281.html"
+ "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#SocialDisadvantage",
+ "@id": "https://w3id.org/dpv/risk#SocietalRisk",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv#RiskConcept"
],
- "http://purl.org/dc/terms/contributor": [
- {
- "@value": "Georg P. Krog"
- }
- ],
- "http://purl.org/dc/terms/created": [
- {
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-19"
- }
- ],
- "http://purl.org/dc/terms/modified": [
- {
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-08-16"
- }
- ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk#"
@@ -3844,13 +4005,13 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#SocietalRisk"
+ "@id": "https://w3id.org/dpv#RiskConcept"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Social Disadvantage"
+ "@value": "Risks and issues that affect or have the potential to affect society at large or specific groups in society"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -3861,12 +4022,12 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Social Disadvantage"
+ "@value": "Societal Risk"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#Reidentification",
+ "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeModification",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -3880,7 +4041,7 @@
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-19"
+ "@value": "2022-08-17"
}
],
"http://purl.org/dc/terms/modified": [
@@ -3889,6 +4050,11 @@
"@value": "2024-08-16"
}
],
+ "http://purl.org/dc/terms/source": [
+ {
+ "@id": "_:Ncecbd81981b3460f9cede6031d4ab8b1"
+ }
+ ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk#"
@@ -3902,13 +4068,16 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk"
+ "@id": "https://w3id.org/dpv/risk#IntegrityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Re-identification"
+ "@value": "Something that acts as or causes Unauthorised Code Modification"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -3919,18 +4088,28 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Re-identification"
+ "@value": "Unauthorised Code Modification"
+ }
+ ]
+ },
+ {
+ "@id": "_:Ncecbd81981b3460f9cede6031d4ab8b1",
+ "@type": [
+ "https://schema.org/WebPage"
+ ],
+ "https://schema.org/name": [
+ {
+ "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments"
}
],
- "http://www.w3.org/2004/02/skos/core#scopeNote": [
+ "https://schema.org/url": [
{
- "@language": "en",
- "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification"
+ "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#Damage",
+ "@id": "https://w3id.org/dpv/risk#UnauthorisedResourceUse",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -3944,7 +4123,7 @@
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-03-30"
+ "@value": "2022-08-17"
}
],
"http://purl.org/dc/terms/modified": [
@@ -3953,6 +4132,11 @@
"@value": "2024-08-16"
}
],
+ "http://purl.org/dc/terms/source": [
+ {
+ "@id": "_:N605e2cac18a74200ab14cc33e319b6cb"
+ }
+ ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk#"
@@ -3966,13 +4150,16 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#LegalRisk"
+ "@id": "https://w3id.org/dpv/risk#AvailabilityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Damage"
+ "@value": "Something that acts as or causes Unauthorised Resource Use"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -3983,37 +4170,75 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Damage"
+ "@value": "Unauthorised Resource Use"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#SecurityAttack",
+ "@id": "_:N605e2cac18a74200ab14cc33e319b6cb",
"@type": [
- "http://www.w3.org/2004/02/skos/core#Concept",
- "http://www.w3.org/2000/01/rdf-schema#Class",
- "https://w3id.org/dpv#RiskConcept"
- ],
- "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
- {
- "@id": "https://w3id.org/dpv/risk#"
- }
+ "https://schema.org/WebPage"
],
- "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
+ "https://schema.org/name": [
{
- "@language": "en",
- "@value": "accepted"
+ "@value": "ISO/IEC 27005:2018"
}
],
- "http://www.w3.org/2004/02/skos/core#broader": [
+ "https://schema.org/url": [
{
- "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
+ "@value": "https://www.iso.org/standard/75281.html"
+ }
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#LoseGoodwill",
+ "@type": [
+ "http://www.w3.org/2004/02/skos/core#Concept",
+ "http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv#RiskConcept"
+ ],
+ "http://purl.org/dc/terms/contributor": [
+ {
+ "@value": "Harshvardhan J. Pandit"
+ }
+ ],
+ "http://purl.org/dc/terms/created": [
+ {
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2022-08-17"
+ }
+ ],
+ "http://purl.org/dc/terms/modified": [
+ {
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2024-08-16"
+ }
+ ],
+ "http://purl.org/dc/terms/source": [
+ {
+ "@id": "_:N194bc10f01ef4bdb99f12487816e6826"
+ }
+ ],
+ "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
+ {
+ "@id": "https://w3id.org/dpv/risk#"
+ }
+ ],
+ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
+ {
+ "@language": "en",
+ "@value": "accepted"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#broader": [
+ {
+ "@id": "https://w3id.org/dpv/risk#ReputationalRisk"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes an attack on security with the aim of undermining it"
+ "@value": "Something that acts as or causes Loss of Goodwill"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -4024,43 +4249,78 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Security Attack"
+ "@value": "Lose of Goodwill"
}
]
},
{
- "@id": "https://w3id.org/dpv/primer",
+ "@id": "_:N194bc10f01ef4bdb99f12487816e6826",
"@type": [
- "http://www.w3.org/ns/dx/prof/ResourceDescriptor"
+ "https://schema.org/WebPage"
],
- "http://purl.org/dc/terms/conformsTo": [
+ "https://schema.org/name": [
{
- "@id": "https://www.w3.org/TR/html/"
+ "@value": "ISO/IEC 27005:2018"
}
],
- "http://purl.org/dc/terms/format": [
+ "https://schema.org/url": [
{
- "@id": "https://www.iana.org/assignments/media-types/text/html"
+ "@value": "https://www.iso.org/standard/75281.html"
+ }
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#ComponentMalfunction",
+ "@type": [
+ "http://www.w3.org/2004/02/skos/core#Concept",
+ "http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv#RiskConcept"
+ ],
+ "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
+ {
+ "@id": "https://w3id.org/dpv/risk#"
}
],
- "http://purl.org/dc/terms/title": [
+ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
{
- "@value": "Primer for Data Privacy Vocabulary"
+ "@language": "en",
+ "@value": "accepted"
}
],
- "http://www.w3.org/ns/dx/prof/hasArtifact": [
+ "http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/primer"
+ "@id": "https://w3id.org/dpv/risk#AvailabilityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk"
}
],
- "http://www.w3.org/ns/dx/prof/hasRole": [
+ "http://www.w3.org/2004/02/skos/core#definition": [
{
- "@id": "http://www.w3.org/ns/dx/prof/role/guidance"
+ "@language": "en",
+ "@value": "Something that acts as or causes Component Malfunction"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#inScheme": [
+ {
+ "@id": "https://w3id.org/dpv/risk#risk-consequences-classes"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#prefLabel": [
+ {
+ "@language": "en",
+ "@value": "Component Malfunction"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#scopeNote": [
+ {
+ "@language": "en",
+ "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#Fraud",
+ "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemModification",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -4085,7 +4345,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:Nd4dde0f0f01e4d739b22630aa8ad7d7a"
+ "@id": "_:N029a97b214024c18a899586cb3864d2a"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -4100,6 +4360,9 @@
}
],
"http://www.w3.org/2004/02/skos/core#broader": [
+ {
+ "@id": "https://w3id.org/dpv/risk#IntegrityConcept"
+ },
{
"@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
}
@@ -4107,7 +4370,7 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Fraud"
+ "@value": "Something that acts as or causes Unauthorised System Modification"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -4118,28 +4381,28 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Fraud"
+ "@value": "Unauthorised System Modification"
}
]
},
{
- "@id": "_:Nd4dde0f0f01e4d739b22630aa8ad7d7a",
+ "@id": "_:N029a97b214024c18a899586cb3864d2a",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ISO/IEC 27005:2018"
+ "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.iso.org/standard/75281.html"
+ "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#SystemIntrusion",
+ "@id": "https://w3id.org/dpv/risk#Sabotage",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -4164,7 +4427,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N7a5848cbabb14c8ea2d162432eba32f0"
+ "@id": "_:N2fc72d8ce45943bcaad06c0a96aac629"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -4179,6 +4442,12 @@
}
],
"http://www.w3.org/2004/02/skos/core#broader": [
+ {
+ "@id": "https://w3id.org/dpv/risk#IntegrityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#AvailabilityConcept"
+ },
{
"@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
}
@@ -4186,7 +4455,7 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes System Intrusion"
+ "@value": "Something that acts as or causes Sabotage"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -4197,12 +4466,12 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "System Intrusion"
+ "@value": "Sabotage"
}
]
},
{
- "@id": "_:N7a5848cbabb14c8ea2d162432eba32f0",
+ "@id": "_:N2fc72d8ce45943bcaad06c0a96aac629",
"@type": [
"https://schema.org/WebPage"
],
@@ -4218,7 +4487,7 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk#DenialServiceAttack",
+ "@id": "https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -4243,10 +4512,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N51a29309d655420e8611a50e7d2baa7c"
- },
- {
- "@id": "_:Nf82ac345e0fe44a394f7da0ec78ef801"
+ "@id": "_:N89971235b5e34930a94f46c696e0ac94"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -4261,6 +4527,9 @@
}
],
"http://www.w3.org/2004/02/skos/core#broader": [
+ {
+ "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept"
+ },
{
"@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
}
@@ -4268,7 +4537,7 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Denial of Service Attack (DoS)"
+ "@value": "Something that acts as or causes Unauthorised Information Disclosure"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -4279,48 +4548,54 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Denial of Service Attack (DoS)"
+ "@value": "Unauthorised Information Disclosure"
}
]
},
{
- "@id": "_:N51a29309d655420e8611a50e7d2baa7c",
+ "@id": "_:N89971235b5e34930a94f46c696e0ac94",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ISO/IEC 27005:2018"
+ "@value": "ENISA Reference Incident Classification Taxonomy 2018"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.iso.org/standard/75281.html"
+ "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
}
]
},
{
- "@id": "_:Nf82ac345e0fe44a394f7da0ec78ef801",
+ "@id": "https://w3id.org/dpv/risk#SexualViolence",
"@type": [
- "https://schema.org/WebPage"
+ "http://www.w3.org/2004/02/skos/core#Concept",
+ "http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv#RiskConcept"
],
- "https://schema.org/name": [
+ "http://purl.org/dc/terms/contributor": [
{
- "@value": "ISO/IEC 27005:2018"
+ "@value": "Harshvardhan J. Pandit"
}
],
- "https://schema.org/url": [
+ "http://purl.org/dc/terms/created": [
{
- "@value": "https://www.iso.org/standard/75281.html"
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2022-08-17"
+ }
+ ],
+ "http://purl.org/dc/terms/modified": [
+ {
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2024-08-16"
+ }
+ ],
+ "http://purl.org/dc/terms/source": [
+ {
+ "@id": "_:Ncb4b4f28b9894b79bfd2a5d2dd41f88f"
}
- ]
- },
- {
- "@id": "https://w3id.org/dpv/risk#EnvironmentalRisk",
- "@type": [
- "http://www.w3.org/2004/02/skos/core#Concept",
- "http://www.w3.org/2000/01/rdf-schema#Class",
- "https://w3id.org/dpv#RiskConcept"
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
@@ -4335,13 +4610,13 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv#RiskConcept"
+ "@id": "https://w3id.org/dpv/risk#IndividualRisk"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Risks and issues that have their origin in environment or can affect the environment at large"
+ "@value": "Something that acts as or causes Sexual Violence"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -4352,12 +4627,28 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Environmental Risk"
+ "@value": "Sexual Violence"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#MalwareAttack",
+ "@id": "_:Ncb4b4f28b9894b79bfd2a5d2dd41f88f",
+ "@type": [
+ "https://schema.org/WebPage"
+ ],
+ "https://schema.org/name": [
+ {
+ "@value": "ENISA Reference Incident Classification Taxonomy 2018"
+ }
+ ],
+ "https://schema.org/url": [
+ {
+ "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
+ }
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#AuthorisationFailure",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -4382,7 +4673,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N933b42794d4f41a39ee17bc9b20bf774"
+ "@id": "_:N588812d3250243469d4d5b0cbd82dc9e"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -4398,13 +4689,19 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
+ "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#IntegrityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Malware Attack"
+ "@value": "Something that acts as or causes Authorisation Failure"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -4415,28 +4712,28 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Malware Attack"
+ "@value": "Authorisation Failure"
}
]
},
{
- "@id": "_:N933b42794d4f41a39ee17bc9b20bf774",
+ "@id": "_:N588812d3250243469d4d5b0cbd82dc9e",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments"
+ "@value": "ENISa Trust Services Security Incidents 2021"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment"
+ "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#serialisation-html",
+ "@id": "https://w3id.org/dpv/primer",
"@type": [
"http://www.w3.org/ns/dx/prof/ResourceDescriptor"
],
@@ -4452,51 +4749,53 @@
],
"http://purl.org/dc/terms/title": [
{
- "@value": "Risk Concepts - HTML serialiation"
+ "@value": "Primer for Data Privacy Vocabulary"
}
],
"http://www.w3.org/ns/dx/prof/hasArtifact": [
{
- "@id": "https://w3id.org/dpv/risk/risk.html"
+ "@id": "https://w3id.org/dpv/primer"
}
],
"http://www.w3.org/ns/dx/prof/hasRole": [
{
- "@id": "http://www.w3.org/ns/dx/prof/role/specification"
+ "@id": "http://www.w3.org/ns/dx/prof/role/guidance"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#AvailabilityBreach",
+ "@id": "https://w3id.org/dpv/guides",
"@type": [
- "http://www.w3.org/2004/02/skos/core#Concept",
- "http://www.w3.org/2000/01/rdf-schema#Class",
- "https://w3id.org/dpv#RiskConcept"
+ "http://www.w3.org/ns/dx/prof/ResourceDescriptor"
],
- "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
+ "http://purl.org/dc/terms/conformsTo": [
{
- "@id": "https://w3id.org/dpv/risk#"
+ "@id": "https://www.w3.org/TR/html/"
}
],
- "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
+ "http://purl.org/dc/terms/format": [
{
- "@language": "en",
- "@value": "accepted"
+ "@id": "https://www.iana.org/assignments/media-types/text/html"
}
],
- "http://www.w3.org/2004/02/skos/core#broader": [
+ "http://purl.org/dc/terms/title": [
{
- "@id": "https://w3id.org/dpv/risk#DataBreach"
+ "@value": "Guides for Data Privacy Vocabulary"
}
],
- "http://www.w3.org/2004/02/skos/core#inScheme": [
+ "http://www.w3.org/ns/dx/prof/hasArtifact": [
{
- "@id": "https://w3id.org/dpv/risk#risk-consequences-classes"
+ "@id": "https://w3id.org/dpv/guides"
+ }
+ ],
+ "http://www.w3.org/ns/dx/prof/hasRole": [
+ {
+ "@id": "http://www.w3.org/ns/dx/prof/role/guidance"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#Harm",
+ "@id": "https://w3id.org/dpv/risk#CopyrightViolation",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -4510,7 +4809,7 @@
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-13"
+ "@value": "2022-08-17"
}
],
"http://purl.org/dc/terms/modified": [
@@ -4519,6 +4818,11 @@
"@value": "2024-08-16"
}
],
+ "http://purl.org/dc/terms/source": [
+ {
+ "@id": "_:N3984b17b1694455793b94c3ad850178d"
+ }
+ ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk#"
@@ -4532,13 +4836,13 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#IndividualRisk"
+ "@id": "https://w3id.org/dpv/risk#LegalRisk"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Harm to humans"
+ "@value": "Something that acts as or causes Copyright Violation"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -4549,18 +4853,28 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Harm"
+ "@value": "Copyright Violation"
}
+ ]
+ },
+ {
+ "@id": "_:N3984b17b1694455793b94c3ad850178d",
+ "@type": [
+ "https://schema.org/WebPage"
],
- "http://www.w3.org/2004/02/skos/core#scopeNote": [
+ "https://schema.org/name": [
{
- "@language": "en",
- "@value": "This concept refers to the general abstract notion of harm"
+ "@value": "ENISA Reference Incident Classification Taxonomy 2018"
+ }
+ ],
+ "https://schema.org/url": [
+ {
+ "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#ViolatingContractualObligation",
+ "@id": "https://w3id.org/dpv/risk#EquipmentMalfunction",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -4585,7 +4899,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N1802c2900f5b4c578896c91c3149381d"
+ "@id": "_:N53bfad5db8324151841ce01472d06f41"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -4596,18 +4910,21 @@
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
{
"@language": "en",
- "@value": "modified"
+ "@value": "accepted"
}
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#LegalRisk"
+ "@id": "https://w3id.org/dpv/risk#AvailabilityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Violation of Contractual Obligations"
+ "@value": "Something that acts as or causes Equipment Malfunction"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -4618,18 +4935,18 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Violation of Contractual Obligation"
+ "@value": "Equipment Malfunction"
}
],
"http://www.w3.org/2004/02/skos/core#scopeNote": [
{
"@language": "en",
- "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0"
+ "@value": "Here equipment refers to physical equipment"
}
]
},
{
- "@id": "_:N1802c2900f5b4c578896c91c3149381d",
+ "@id": "_:N53bfad5db8324151841ce01472d06f41",
"@type": [
"https://schema.org/WebPage"
],
@@ -4645,7 +4962,39 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk#Extorsion",
+ "@id": "https://w3id.org/dpv/risk#AvailabilityBreach",
+ "@type": [
+ "http://www.w3.org/2004/02/skos/core#Concept",
+ "http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv#RiskConcept"
+ ],
+ "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
+ {
+ "@id": "https://w3id.org/dpv/risk#"
+ }
+ ],
+ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
+ {
+ "@language": "en",
+ "@value": "accepted"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#broader": [
+ {
+ "@id": "https://w3id.org/dpv/risk#AvailabilityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#DataBreach"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#inScheme": [
+ {
+ "@id": "https://w3id.org/dpv/risk#risk-consequences-classes"
+ }
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#UnauthorisedDataDisclosure",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -4670,7 +5019,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N40f94dff19814aa6ae7d3074eb3409d8"
+ "@id": "_:N7c66233cabb64c2486ae612a1ff6b01d"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -4685,6 +5034,9 @@
}
],
"http://www.w3.org/2004/02/skos/core#broader": [
+ {
+ "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept"
+ },
{
"@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
}
@@ -4692,7 +5044,7 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Extorsion"
+ "@value": "Something that acts as or causes Unauthorised Data Disclosure"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -4703,28 +5055,28 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Extorsion"
+ "@value": "Unauthorised Data Disclosure"
}
]
},
{
- "@id": "_:N40f94dff19814aa6ae7d3074eb3409d8",
+ "@id": "_:N7c66233cabb64c2486ae612a1ff6b01d",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ENISA Threat Taxonomy 2016"
+ "@value": "ISO/IEC 27005:2018"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view"
+ "@value": "https://www.iso.org/standard/75281.html"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#IndividualHealthSafety",
+ "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -4743,7 +5095,13 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#IndividualRisk"
+ "@id": "https://w3id.org/dpv#RiskConcept"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#definition": [
+ {
+ "@language": "en",
+ "@value": "Risks and issues that arise during operational processes"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -4754,12 +5112,12 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Individual Health & Safety"
+ "@value": "Operational Security Risk"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#PsychologicalHarm",
+ "@id": "https://w3id.org/dpv/risk#UnauthorisedDataModification",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -4784,7 +5142,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N903ec696d7504183af4ba63f3f295e8e"
+ "@id": "_:Nb76ee4ad00614561b02ea8b1fd3da77c"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -4800,13 +5158,16 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#IndividualRisk"
+ "@id": "https://w3id.org/dpv/risk#IntegrityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Psychological Harm"
+ "@value": "Something that acts as or causes Unauthorised Data Modification"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -4817,12 +5178,12 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Psychological Harm"
+ "@value": "Unauthorised Data Modification"
}
]
},
{
- "@id": "_:N903ec696d7504183af4ba63f3f295e8e",
+ "@id": "_:Nb76ee4ad00614561b02ea8b1fd3da77c",
"@type": [
"https://schema.org/WebPage"
],
@@ -4838,7 +5199,38 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk#PhysicalAssault",
+ "@id": "https://w3id.org/dpv/risk#serialisation-jsonld",
+ "@type": [
+ "http://www.w3.org/ns/dx/prof/ResourceDescriptor"
+ ],
+ "http://purl.org/dc/terms/conformsTo": [
+ {
+ "@id": "https://www.w3.org/TR/json-ld11/"
+ }
+ ],
+ "http://purl.org/dc/terms/format": [
+ {
+ "@id": "https://www.iana.org/assignments/media-types/application/ld+json"
+ }
+ ],
+ "http://purl.org/dc/terms/title": [
+ {
+ "@value": "Risk Concepts - JSON-LD serialiation"
+ }
+ ],
+ "http://www.w3.org/ns/dx/prof/hasArtifact": [
+ {
+ "@id": "https://w3id.org/dpv/risk/risk.jsonld"
+ }
+ ],
+ "http://www.w3.org/ns/dx/prof/hasRole": [
+ {
+ "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary"
+ }
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#LoseReputation",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -4863,7 +5255,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N4414613afa8c4456b9a9b6c3f17a7a0c"
+ "@id": "_:N90d89ca8a8594ecabee31205aee25395"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -4879,13 +5271,13 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#IndividualRisk"
+ "@id": "https://w3id.org/dpv/risk#ReputationalRisk"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Physical Assault"
+ "@value": "Something that acts as or causes Loss of Reputation"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -4896,12 +5288,12 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Physical Assault"
+ "@value": "Lose of Reputation"
}
]
},
{
- "@id": "_:N4414613afa8c4456b9a9b6c3f17a7a0c",
+ "@id": "_:N90d89ca8a8594ecabee31205aee25395",
"@type": [
"https://schema.org/WebPage"
],
@@ -4917,7 +5309,13 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure",
+ "@id": "https://w3id.org/dpv/risk#risk-consequences-classes",
+ "@type": [
+ "http://www.w3.org/2004/02/skos/core#ConceptScheme"
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeAccess",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -4942,7 +5340,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:Nb2d6659136cf4d2fa881ae5798bf0e58"
+ "@id": "_:N99568e0cd3774d348d85262f04bc3a0b"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -4957,6 +5355,12 @@
}
],
"http://www.w3.org/2004/02/skos/core#broader": [
+ {
+ "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#IntegrityConcept"
+ },
{
"@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
}
@@ -4964,7 +5368,7 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Unauthorised Information Disclosure"
+ "@value": "Something that acts as or causes Unauthorised Code Access"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -4975,28 +5379,28 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Unauthorised Information Disclosure"
+ "@value": "Unauthorised Code Access"
}
]
},
{
- "@id": "_:Nb2d6659136cf4d2fa881ae5798bf0e58",
+ "@id": "_:N99568e0cd3774d348d85262f04bc3a0b",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ENISA Reference Incident Classification Taxonomy 2018"
+ "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
+ "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#RightsImpact",
+ "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -5021,7 +5425,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N4e0b95db2d414e7588f607d2edf6902e"
+ "@id": "_:Nc4c391b305be479eb0e623d887a478ac"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -5037,16 +5441,16 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#SocietalRisk"
+ "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept"
},
{
- "@id": "https://w3id.org/dpv#Impact"
+ "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Impact to Rights"
+ "@value": "Something that acts as or causes Unauthorised Code Disclosure"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -5057,34 +5461,28 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Impact to Rights"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#scopeNote": [
- {
- "@language": "en",
- "@value": "This concept was called \"ImpactToRights\" in DPV 2.0"
+ "@value": "Unauthorised Code Disclosure"
}
]
},
{
- "@id": "_:N4e0b95db2d414e7588f607d2edf6902e",
+ "@id": "_:Nc4c391b305be479eb0e623d887a478ac",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ISO/IEC 27005:2018"
+ "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.iso.org/standard/75281.html"
+ "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#DataBreach",
+ "@id": "https://w3id.org/dpv/risk#DistributedDenialServiceAttack",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -5109,15 +5507,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N82834c9f1ecf4644ab2d9343a1169c62"
- }
- ],
- "http://purl.org/vocab/vann/example": [
- {
- "@id": "https://w3id.org/dpv/examples#E0069"
- },
- {
- "@id": "https://w3id.org/dpv/examples#E0071"
+ "@id": "_:N64ebcf10636d495599fc0fd262e44103"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -5133,13 +5523,16 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#SecurityBreach"
+ "@id": "https://w3id.org/dpv/risk#AvailabilityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Data Breach"
+ "@value": "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -5150,12 +5543,12 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Data Breach"
+ "@value": "Distributed Denial of Service Attack (DDoS)"
}
]
},
{
- "@id": "_:N82834c9f1ecf4644ab2d9343a1169c62",
+ "@id": "_:N64ebcf10636d495599fc0fd262e44103",
"@type": [
"https://schema.org/WebPage"
],
@@ -5171,29 +5564,12 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk#RightsExercisePrevention",
+ "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv#RiskConcept"
],
- "http://purl.org/dc/terms/contributor": [
- {
- "@value": "Georg P. Krog, Harshvardhan J. Pandit"
- }
- ],
- "http://purl.org/dc/terms/created": [
- {
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-18"
- }
- ],
- "http://purl.org/dc/terms/modified": [
- {
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-08-16"
- }
- ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk#"
@@ -5207,13 +5583,13 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#SocietalRisk"
+ "@id": "https://w3id.org/dpv#RiskConcept"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Prevent Exercising of Rights"
+ "@value": "Concepts associated with security threats that are likely to originate externally"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -5224,18 +5600,12 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Prevent Exercising of Rights"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#scopeNote": [
- {
- "@language": "en",
- "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0"
+ "@value": "External Security Threat"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#Detriment",
+ "@id": "https://w3id.org/dpv/risk#PhishingScam",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -5243,13 +5613,13 @@
],
"http://purl.org/dc/terms/contributor": [
{
- "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves"
+ "@value": "Harshvardhan J. Pandit"
}
],
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-03-23"
+ "@value": "2022-08-17"
}
],
"http://purl.org/dc/terms/modified": [
@@ -5258,6 +5628,11 @@
"@value": "2024-08-16"
}
],
+ "http://purl.org/dc/terms/source": [
+ {
+ "@id": "_:Nb657a11b610f419a86eb9ea4a94e7e37"
+ }
+ ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk#"
@@ -5271,13 +5646,16 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#LegalRisk"
+ "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Detriment"
+ "@value": "Something that acts as or causes Phishing Scam"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -5288,37 +5666,48 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Detriment"
+ "@value": "Phishing Scam"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#LoseReputation",
+ "@id": "_:Nb657a11b610f419a86eb9ea4a94e7e37",
"@type": [
- "http://www.w3.org/2004/02/skos/core#Concept",
- "http://www.w3.org/2000/01/rdf-schema#Class",
- "https://w3id.org/dpv#RiskConcept"
+ "https://schema.org/WebPage"
],
- "http://purl.org/dc/terms/contributor": [
+ "https://schema.org/name": [
{
- "@value": "Harshvardhan J. Pandit"
+ "@value": "ENISA Threat Landscape for Ransomware Attacks 2022"
}
],
- "http://purl.org/dc/terms/created": [
+ "https://schema.org/url": [
{
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
+ "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks"
+ }
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#Damage",
+ "@type": [
+ "http://www.w3.org/2004/02/skos/core#Concept",
+ "http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv#RiskConcept"
+ ],
+ "http://purl.org/dc/terms/contributor": [
+ {
+ "@value": "Harshvardhan J. Pandit"
}
],
- "http://purl.org/dc/terms/modified": [
+ "http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-08-16"
+ "@value": "2022-03-30"
}
],
- "http://purl.org/dc/terms/source": [
+ "http://purl.org/dc/terms/modified": [
{
- "@id": "_:N0282f3114f5b4278b632620b9b954c7d"
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2024-08-16"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -5334,13 +5723,13 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#ReputationalRisk"
+ "@id": "https://w3id.org/dpv/risk#LegalRisk"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Loss of Reputation"
+ "@value": "Something that acts as or causes Damage"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -5351,28 +5740,12 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Lose of Reputation"
- }
- ]
- },
- {
- "@id": "_:N0282f3114f5b4278b632620b9b954c7d",
- "@type": [
- "https://schema.org/WebPage"
- ],
- "https://schema.org/name": [
- {
- "@value": "ISO/IEC 27005:2018"
- }
- ],
- "https://schema.org/url": [
- {
- "@value": "https://www.iso.org/standard/75281.html"
+ "@value": "Damage"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#ViolatingCodeOfConduct",
+ "@id": "https://w3id.org/dpv/risk#Renumeration",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -5380,13 +5753,13 @@
],
"http://purl.org/dc/terms/contributor": [
{
- "@value": "Harshvardhan J. Pandit"
+ "@value": "Georg P. Krog, Harshvardhan J. Pandit"
}
],
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
+ "@value": "2024-04-14"
}
],
"http://purl.org/dc/terms/modified": [
@@ -5395,11 +5768,6 @@
"@value": "2024-08-16"
}
],
- "http://purl.org/dc/terms/source": [
- {
- "@id": "_:N3d2e8d97024142dca7a47b73cbb8097c"
- }
- ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk#"
@@ -5408,18 +5776,18 @@
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
{
"@language": "en",
- "@value": "modified"
+ "@value": "accepted"
}
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#LegalRisk"
+ "@id": "https://w3id.org/dpv/risk#FinancialImpact"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Violation of Code of Conduct"
+ "@value": "Something that acts as or provides renumeration which is in monetary or financial form"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -5430,34 +5798,12 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Violating Code of Conduct"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#scopeNote": [
- {
- "@language": "en",
- "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0"
- }
- ]
- },
- {
- "@id": "_:N3d2e8d97024142dca7a47b73cbb8097c",
- "@type": [
- "https://schema.org/WebPage"
- ],
- "https://schema.org/name": [
- {
- "@value": "ISO/IEC 27005:2018"
- }
- ],
- "https://schema.org/url": [
- {
- "@value": "https://www.iso.org/standard/75281.html"
+ "@value": "Remuneration"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#FinancialLoss",
+ "@id": "https://w3id.org/dpv/risk#LoseOpportunity",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -5482,7 +5828,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N0296c48d481641d492572a05652b6bf5"
+ "@id": "_:N2ea871931e3746e4aff469f67008e44f"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -5498,13 +5844,13 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#FinancialImpact"
+ "@id": "https://w3id.org/dpv/risk#ReputationalRisk"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity"
+ "@value": "Something that acts as or causes Loss of Opportunity"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -5515,12 +5861,12 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Financial Loss"
+ "@value": "Lose of Opportunity"
}
]
},
{
- "@id": "_:N0296c48d481641d492572a05652b6bf5",
+ "@id": "_:N2ea871931e3746e4aff469f67008e44f",
"@type": [
"https://schema.org/WebPage"
],
@@ -5536,10 +5882,33 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk#IndividualRisk",
+ "@id": "https://w3id.org/dpv/risk#UnauthorisedDataAccess",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
- "http://www.w3.org/2000/01/rdf-schema#Class"
+ "http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv#RiskConcept"
+ ],
+ "http://purl.org/dc/terms/contributor": [
+ {
+ "@value": "Harshvardhan J. Pandit"
+ }
+ ],
+ "http://purl.org/dc/terms/created": [
+ {
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2022-08-17"
+ }
+ ],
+ "http://purl.org/dc/terms/modified": [
+ {
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2024-08-16"
+ }
+ ],
+ "http://purl.org/dc/terms/source": [
+ {
+ "@id": "_:N0eacc049940646a99623da2cd6a2d394"
+ }
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
@@ -5552,10 +5921,18 @@
"@value": "accepted"
}
],
+ "http://www.w3.org/2004/02/skos/core#broader": [
+ {
+ "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
+ }
+ ],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Risks and issues that affect or have the potential to affect specific individuals"
+ "@value": "Something that acts as or causes Unauthorised Data Access"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -5566,12 +5943,28 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Individual Risk"
+ "@value": "Unauthorised Data Access"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#Blackmail",
+ "@id": "_:N0eacc049940646a99623da2cd6a2d394",
+ "@type": [
+ "https://schema.org/WebPage"
+ ],
+ "https://schema.org/name": [
+ {
+ "@value": "ENISA Reference Incident Classification Taxonomy 2018"
+ }
+ ],
+ "https://schema.org/url": [
+ {
+ "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
+ }
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#CompromiseAccountCredentials",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -5596,7 +5989,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N3ef9f5a9eb554279905f69c263712205"
+ "@id": "_:N1005943ded74408ea68c811475686000"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -5612,13 +6005,16 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
+ "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Blackmail"
+ "@value": "Something that acts as or causes Account Credentials to be compromised"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -5629,28 +6025,28 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Blackmail"
+ "@value": "Compromise Account Credentials"
}
]
},
{
- "@id": "_:N3ef9f5a9eb554279905f69c263712205",
+ "@id": "_:N1005943ded74408ea68c811475686000",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ISO/IEC 27005:2018"
+ "@value": "ENISA Reference Incident Classification Taxonomy 2018"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.iso.org/standard/75281.html"
+ "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#LoseNegotiatingCapacity",
+ "@id": "https://w3id.org/dpv/risk#UnwantedDisclosureData",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -5675,7 +6071,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:Nd8a232e440f041b496b97da8007b588a"
+ "@id": "_:Nf14815c8a8694940bcdb35d12bf37b11"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -5691,13 +6087,16 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#ReputationalRisk"
+ "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Loss of Negotiating Capacity"
+ "@value": "Something that acts as or causes Unwanted Disclosure of Data"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -5708,12 +6107,12 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Lose of Negotiating Capacity"
+ "@value": "Unwanted Disclosure of Data"
}
]
},
{
- "@id": "_:Nd8a232e440f041b496b97da8007b588a",
+ "@id": "_:Nf14815c8a8694940bcdb35d12bf37b11",
"@type": [
"https://schema.org/WebPage"
],
@@ -5729,240 +6128,210 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk",
+ "@id": "https://w3id.org/dpv/risk#JudicialCosts",
"@type": [
- "http://www.w3.org/2002/07/owl#Ontology",
- "http://www.w3.org/ns/dx/prof/Profile"
+ "http://www.w3.org/2004/02/skos/core#Concept",
+ "http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv#RiskConcept"
],
- "http://purl.org/dc/terms/bibliographicCitation": [
+ "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
- "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426"
+ "@id": "https://w3id.org/dpv/risk#"
}
],
- "http://purl.org/dc/terms/conformsTo": [
- {
- "@value": "http://www.w3.org/2000/01/rdf-schema"
- },
+ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
{
- "@value": "http://www.w3.org/2004/02/skos/core"
+ "@language": "en",
+ "@value": "accepted"
}
],
- "http://purl.org/dc/terms/contributor": [
- {
- "@value": "Harshvardhan J. Pandit"
- },
- {
- "@value": "Georg P. Krog"
- },
+ "http://www.w3.org/2004/02/skos/core#broader": [
{
- "@value": "Beatriz Esteves"
- },
+ "@id": "https://w3id.org/dpv/risk#FinancialImpact"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#definition": [
{
- "@value": "Axel Polleres"
- },
+ "@language": "en",
+ "@value": "Something that involves or causes judicial costs to be paid"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#inScheme": [
{
- "@value": "Fajar Ekaputra"
- },
+ "@id": "https://w3id.org/dpv/risk#risk-consequences-classes"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#prefLabel": [
{
- "@value": "Delaram Golpayegani"
- },
+ "@language": "en",
+ "@value": "Judicial Costs"
+ }
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#UserRisks",
+ "@type": [
+ "http://www.w3.org/2004/02/skos/core#Concept",
+ "http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv#RiskConcept"
+ ],
+ "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
- "@value": "Julian Flake"
+ "@id": "https://w3id.org/dpv/risk#"
}
],
- "http://purl.org/dc/terms/created": [
+ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
{
"@language": "en",
- "@value": "2022-08-14"
+ "@value": "accepted"
}
],
- "http://purl.org/dc/terms/creator": [
+ "http://www.w3.org/2004/02/skos/core#broader": [
{
- "@language": "en",
- "@value": "Harshvardhan J. Pandit"
- },
+ "@id": "https://w3id.org/dpv#RiskConcept"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Georg P. Krog"
- },
+ "@value": "Concepts associated with risks that arise due to User or Human use"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#inScheme": [
{
- "@language": "en",
- "@value": "Paul Ryan"
- },
+ "@id": "https://w3id.org/dpv/risk#risk-consequences-classes"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Rob Brennan"
- },
- {
- "@language": "en",
- "@value": "Delaram Golpayegani"
- },
- {
- "@language": "en",
- "@value": "Beatriz Esteves"
- },
- {
- "@language": "en",
- "@value": "Julian Flake"
- }
- ],
- "http://purl.org/dc/terms/description": [
- {
- "@language": "en",
- "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management"
- }
- ],
- "http://purl.org/dc/terms/identifier": [
- {
- "@value": "https://w3id.org/dpv/risk"
+ "@value": "User Risks"
}
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#ViolatingContractualObligation",
+ "@type": [
+ "http://www.w3.org/2004/02/skos/core#Concept",
+ "http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv#RiskConcept"
],
- "http://purl.org/dc/terms/issued": [
+ "http://purl.org/dc/terms/contributor": [
{
- "@language": "en",
- "@value": "2022-08-14"
+ "@value": "Harshvardhan J. Pandit"
}
],
- "http://purl.org/dc/terms/license": [
+ "http://purl.org/dc/terms/created": [
{
- "@id": "https://www.w3.org/copyright/document-license-2023/"
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2022-08-17"
}
],
"http://purl.org/dc/terms/modified": [
{
- "@language": "en",
- "@value": "2024-07-13"
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2024-08-16"
}
],
- "http://purl.org/dc/terms/publisher": [
+ "http://purl.org/dc/terms/source": [
{
- "@id": "https://www.w3.org/"
+ "@id": "_:N638499f1a35f4f94abab8a1e6e4bf97d"
}
],
- "http://purl.org/dc/terms/source": [
+ "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
- "@id": "https://www.w3.org/groups/cg/dpvcg/"
+ "@id": "https://w3id.org/dpv/risk#"
}
],
- "http://purl.org/dc/terms/title": [
+ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
{
"@language": "en",
- "@value": "Risk Concepts"
+ "@value": "modified"
}
],
- "http://purl.org/ontology/bibo/doi": [
+ "http://www.w3.org/2004/02/skos/core#broader": [
{
- "@value": "10.5281/zenodo.12505841"
+ "@id": "https://w3id.org/dpv/risk#LegalRisk"
}
],
- "http://purl.org/ontology/bibo/status": [
+ "http://www.w3.org/2004/02/skos/core#definition": [
{
- "@value": "http://purl.org/ontology/bibo/status/published"
+ "@language": "en",
+ "@value": "Something that acts as or causes Violation of Contractual Obligations"
}
],
- "http://purl.org/vocab/vann/preferredNamespacePrefix": [
+ "http://www.w3.org/2004/02/skos/core#inScheme": [
{
- "@value": "risk"
+ "@id": "https://w3id.org/dpv/risk#risk-consequences-classes"
}
],
- "http://purl.org/vocab/vann/preferredNamespaceUri": [
+ "http://www.w3.org/2004/02/skos/core#prefLabel": [
{
- "@value": "https://w3id.org/dpv/risk#"
+ "@language": "en",
+ "@value": "Violation of Contractual Obligation"
}
],
- "http://www.w3.org/2000/01/rdf-schema#Label": [
+ "http://www.w3.org/2004/02/skos/core#scopeNote": [
{
"@language": "en",
- "@value": "RISK"
+ "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0"
}
+ ]
+ },
+ {
+ "@id": "_:N638499f1a35f4f94abab8a1e6e4bf97d",
+ "@type": [
+ "https://schema.org/WebPage"
],
- "http://www.w3.org/2002/07/owl#versionIRI": [
+ "https://schema.org/name": [
{
- "@id": "https://w3id.org/dpv/2.1-dev/risk"
+ "@value": "ISO/IEC 27005:2018"
}
],
- "http://www.w3.org/2002/07/owl#versionInfo": [
+ "https://schema.org/url": [
{
- "@value": "2.1-dev"
+ "@value": "https://www.iso.org/standard/75281.html"
}
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#serialisation-n3",
+ "@type": [
+ "http://www.w3.org/ns/dx/prof/ResourceDescriptor"
],
- "http://www.w3.org/ns/dx/prof/hasResource": [
- {
- "@id": "https://w3id.org/dpv/primer"
- },
- {
- "@id": "https://w3id.org/dpv/guides"
- },
- {
- "@id": "https://w3id.org/dpv/examples"
- },
- {
- "@id": "https://w3id.org/dpv/risk#serialisation-html"
- },
- {
- "@id": "https://w3id.org/dpv/risk#serialisation-rdf"
- },
- {
- "@id": "https://w3id.org/dpv/risk#serialisation-ttl"
- },
- {
- "@id": "https://w3id.org/dpv/risk#serialisation-n3"
- },
+ "http://purl.org/dc/terms/conformsTo": [
{
- "@id": "https://w3id.org/dpv/risk#serialisation-jsonld"
+ "@id": "https://www.w3.org/TeamSubmission/n3/"
}
],
- "http://www.w3.org/ns/dx/prof/isProfileOf": [
- {
- "@id": "http://www.w3.org/2000/01/rdf-schema#"
- },
+ "http://purl.org/dc/terms/format": [
{
- "@id": "http://www.w3.org/2004/02/skos/core#"
- },
+ "@id": "https://www.iana.org/assignments/media-types/text/n3"
+ }
+ ],
+ "http://purl.org/dc/terms/title": [
{
- "@id": "https://w3id.org/dpv"
+ "@value": "Risk Concepts - N3 serialiation"
}
],
- "http://xmlns.com/foaf/0.1/logo": [
+ "http://www.w3.org/ns/dx/prof/hasArtifact": [
{
- "@id": "https://w3id.org/dpv/media/logo.png"
+ "@id": "https://w3id.org/dpv/risk/risk.n3"
}
],
- "https://schema.org/version": [
+ "http://www.w3.org/ns/dx/prof/hasRole": [
{
- "@value": "2.1-dev"
+ "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#LoseOpportunity",
+ "@id": "https://w3id.org/dpv/risk#SecurityAttack",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv#RiskConcept"
],
- "http://purl.org/dc/terms/contributor": [
- {
- "@value": "Harshvardhan J. Pandit"
- }
- ],
- "http://purl.org/dc/terms/created": [
- {
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
- }
- ],
- "http://purl.org/dc/terms/modified": [
- {
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-08-16"
- }
- ],
- "http://purl.org/dc/terms/source": [
- {
- "@id": "_:N0e6dade5a2814d0f815e1c5dd41f1c65"
- }
- ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk#"
@@ -5976,13 +6345,22 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#ReputationalRisk"
+ "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#IntegrityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#AvailabilityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Loss of Opportunity"
+ "@value": "Something that acts as or causes an attack on security with the aim of undermining it"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -5993,28 +6371,12 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Lose of Opportunity"
- }
- ]
- },
- {
- "@id": "_:N0e6dade5a2814d0f815e1c5dd41f1c65",
- "@type": [
- "https://schema.org/WebPage"
- ],
- "https://schema.org/name": [
- {
- "@value": "ISO/IEC 27005:2018"
- }
- ],
- "https://schema.org/url": [
- {
- "@value": "https://www.iso.org/standard/75281.html"
+ "@value": "Security Attack"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#ComponentFailure",
+ "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -6033,13 +6395,22 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk"
+ "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#IntegrityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#AvailabilityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Component Failure"
+ "@value": "Something that acts as or causes Unauthorised Activity"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -6050,18 +6421,12 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Component Failure"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#scopeNote": [
- {
- "@language": "en",
- "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of"
+ "@value": "Unauthorised Activity"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#BruteForceAuthorisations",
+ "@id": "https://w3id.org/dpv/risk#Fraud",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -6086,7 +6451,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:Ned6a23a4f6894305bc5d07abc6872b8e"
+ "@id": "_:N0328e4baf7504ceb93cd9bbab8b23099"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -6101,6 +6466,9 @@
}
],
"http://www.w3.org/2004/02/skos/core#broader": [
+ {
+ "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept"
+ },
{
"@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
}
@@ -6108,7 +6476,7 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"
+ "@value": "Something that acts as or causes Fraud"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -6119,28 +6487,28 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Brute Force Authorisations"
+ "@value": "Fraud"
}
]
},
{
- "@id": "_:Ned6a23a4f6894305bc5d07abc6872b8e",
+ "@id": "_:N0328e4baf7504ceb93cd9bbab8b23099",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ENISA Reference Incident Classification Taxonomy 2018"
+ "@value": "ISO/IEC 27005:2018"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
+ "@value": "https://www.iso.org/standard/75281.html"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#ViolatingLegalObligation",
+ "@id": "https://w3id.org/dpv/risk#MaliciousCodeAttack",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -6165,7 +6533,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:Naf3bb0ebde894641a8c0a69545e7f6cc"
+ "@id": "_:N625dc3c061c74eec9f96d171c60fd3c0"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -6176,18 +6544,27 @@
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
{
"@language": "en",
- "@value": "modified"
+ "@value": "accepted"
}
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#LegalRisk"
+ "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#IntegrityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#AvailabilityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Violation of Legal Obligations"
+ "@value": "Something that acts as or causes Malicious Code Attack"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -6198,34 +6575,28 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Violation of Legal Obligations"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#scopeNote": [
- {
- "@language": "en",
- "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0"
+ "@value": "Malicious Code Attack"
}
]
},
{
- "@id": "_:Naf3bb0ebde894641a8c0a69545e7f6cc",
+ "@id": "_:N625dc3c061c74eec9f96d171c60fd3c0",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ISO/IEC 27005:2018"
+ "@value": "ENISA Reference Incident Classification Taxonomy 2018"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.iso.org/standard/75281.html"
+ "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#Scam",
+ "@id": "https://w3id.org/dpv/risk#CompromiseAccount",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -6250,7 +6621,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N498890541a5449e290f0aea406ea5090"
+ "@id": "_:N252928e4ed0f4c6ea83876f7fb2c3d78"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -6266,13 +6637,22 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
+ "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#IntegrityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#AvailabilityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Scam"
+ "@value": "Something that acts as or causes a compromised account that is then used by the compromiser"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -6283,86 +6663,28 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Scam"
+ "@value": "Compromise Account"
}
]
},
{
- "@id": "_:N498890541a5449e290f0aea406ea5090",
+ "@id": "_:N252928e4ed0f4c6ea83876f7fb2c3d78",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ISO/IEC 27005:2018"
+ "@value": "ENISA Reference Incident Classification Taxonomy 2018"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.iso.org/standard/75281.html"
- }
- ]
- },
- {
- "@id": "https://w3id.org/dpv/risk#Discrimination",
- "@type": [
- "http://www.w3.org/2004/02/skos/core#Concept",
- "http://www.w3.org/2000/01/rdf-schema#Class",
- "https://w3id.org/dpv#RiskConcept"
- ],
- "http://purl.org/dc/terms/contributor": [
- {
- "@value": "Georg P. Krog"
- }
- ],
- "http://purl.org/dc/terms/created": [
- {
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-19"
- }
- ],
- "http://purl.org/dc/terms/modified": [
- {
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-08-16"
- }
- ],
- "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
- {
- "@id": "https://w3id.org/dpv/risk#"
- }
- ],
- "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
- {
- "@language": "en",
- "@value": "accepted"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#broader": [
- {
- "@id": "https://w3id.org/dpv/risk#SocietalRisk"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#definition": [
- {
- "@language": "en",
- "@value": "Something that acts as or causes Discrimination"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#inScheme": [
- {
- "@id": "https://w3id.org/dpv/risk#risk-consequences-classes"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#prefLabel": [
- {
- "@language": "en",
- "@value": "Discrimination"
+ "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#UnwantedDisclosureData",
+ "@id": "https://w3id.org/dpv/risk#BruteForceAuthorisations",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -6387,7 +6709,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N12b2c9394da44250a5ab771adc23fab8"
+ "@id": "_:Nb75b090fdcda4ec38e841680681bf642"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -6402,6 +6724,12 @@
}
],
"http://www.w3.org/2004/02/skos/core#broader": [
+ {
+ "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#IntegrityConcept"
+ },
{
"@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
}
@@ -6409,7 +6737,7 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Unwanted Disclosure of Data"
+ "@value": "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -6420,28 +6748,28 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Unwanted Disclosure of Data"
+ "@value": "Brute Force Authorisations"
}
]
},
{
- "@id": "_:N12b2c9394da44250a5ab771adc23fab8",
+ "@id": "_:Nb75b090fdcda4ec38e841680681bf642",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ISO/IEC 27005:2018"
+ "@value": "ENISA Reference Incident Classification Taxonomy 2018"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.iso.org/standard/75281.html"
+ "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#PhishingScam",
+ "@id": "https://w3id.org/dpv/risk#ViolatingCodeOfConduct",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -6466,7 +6794,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N2039355de6a7474a8ab35355297e33c6"
+ "@id": "_:Nb240be91051241df8fe71581eedea8cc"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -6477,18 +6805,18 @@
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
{
"@language": "en",
- "@value": "accepted"
+ "@value": "modified"
}
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
+ "@id": "https://w3id.org/dpv/risk#LegalRisk"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Phishing Scam"
+ "@value": "Something that acts as or causes Violation of Code of Conduct"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -6499,50 +6827,39 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Phishing Scam"
+ "@value": "Violating Code of Conduct"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#scopeNote": [
+ {
+ "@language": "en",
+ "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0"
}
]
},
{
- "@id": "_:N2039355de6a7474a8ab35355297e33c6",
+ "@id": "_:Nb240be91051241df8fe71581eedea8cc",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ENISA Threat Landscape for Ransomware Attacks 2022"
+ "@value": "ISO/IEC 27005:2018"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks"
+ "@value": "https://www.iso.org/standard/75281.html"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#Renumeration",
+ "@id": "https://w3id.org/dpv/risk#IntentionalMisuse",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv#RiskConcept"
],
- "http://purl.org/dc/terms/contributor": [
- {
- "@value": "Georg P. Krog, Harshvardhan J. Pandit"
- }
- ],
- "http://purl.org/dc/terms/created": [
- {
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-04-14"
- }
- ],
- "http://purl.org/dc/terms/modified": [
- {
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-08-16"
- }
- ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk#"
@@ -6556,13 +6873,13 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#FinancialImpact"
+ "@id": "https://w3id.org/dpv/risk#UserRisks"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or provides renumeration which is in monetary or financial form"
+ "@value": "Intentional Misuse"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -6573,12 +6890,12 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Remuneration"
+ "@value": "Intentional Misuse"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#EquipmentFailure",
+ "@id": "https://w3id.org/dpv/risk#PersonalSafetyEndangerment",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -6603,7 +6920,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:Nc281053cb7ff4095b5eef42624c4ff46"
+ "@id": "_:Na783f8da28594e8794173492db9ecac9"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -6619,13 +6936,13 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk"
+ "@id": "https://w3id.org/dpv/risk#SocietalRisk"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Equipment Failure"
+ "@value": "Something that acts as or causes Personal Safety Endangerment"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -6636,18 +6953,12 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Equipment Failure"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#scopeNote": [
- {
- "@language": "en",
- "@value": "Here equipment refers to physical equipment"
+ "@value": "Personal Safety Endangerment"
}
]
},
{
- "@id": "_:Nc281053cb7ff4095b5eef42624c4ff46",
+ "@id": "_:Na783f8da28594e8794173492db9ecac9",
"@type": [
"https://schema.org/WebPage"
],
@@ -6663,7 +6974,7 @@
]
},
{
- "@id": "https://w3id.org/dpv/risk#LoseTrust",
+ "@id": "https://w3id.org/dpv/risk#IdentityTheft",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -6688,7 +6999,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:Nbb93cef662444084828d04948d35895d"
+ "@id": "_:N33b7660d50a4461e927089957dfd848b"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -6704,13 +7015,16 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#ReputationalRisk"
+ "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Loss of Trust"
+ "@value": "Something that acts as or causes Identity Theft"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -6721,531 +7035,234 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Lose of Trust"
+ "@value": "Identity Theft"
}
]
},
{
- "@id": "_:Nbb93cef662444084828d04948d35895d",
+ "@id": "_:N33b7660d50a4461e927089957dfd848b",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ISO/IEC 27005:2018"
+ "@value": "ENISA Threat Taxonomy 2016"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.iso.org/standard/75281.html"
+ "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#AccidentalMisuse",
+ "@id": "https://w3id.org/dpv/risk",
"@type": [
- "http://www.w3.org/2004/02/skos/core#Concept",
- "http://www.w3.org/2000/01/rdf-schema#Class",
- "https://w3id.org/dpv#RiskConcept"
+ "http://www.w3.org/2002/07/owl#Ontology",
+ "http://www.w3.org/ns/dx/prof/Profile"
],
- "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
+ "http://purl.org/dc/terms/bibliographicCitation": [
{
- "@id": "https://w3id.org/dpv/risk#"
+ "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426"
}
],
- "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
+ "http://purl.org/dc/terms/conformsTo": [
{
- "@language": "en",
- "@value": "accepted"
+ "@value": "http://www.w3.org/2000/01/rdf-schema"
+ },
+ {
+ "@value": "http://www.w3.org/2004/02/skos/core"
}
],
- "http://www.w3.org/2004/02/skos/core#broader": [
+ "http://purl.org/dc/terms/contributor": [
{
- "@id": "https://w3id.org/dpv/risk#UserRisks"
+ "@value": "Delaram Golpayegani"
+ },
+ {
+ "@value": "Fajar Ekaputra"
+ },
+ {
+ "@value": "Axel Polleres"
+ },
+ {
+ "@value": "Beatriz Esteves"
+ },
+ {
+ "@value": "Georg P. Krog"
+ },
+ {
+ "@value": "Julian Flake"
+ },
+ {
+ "@value": "Harshvardhan J. Pandit"
}
],
- "http://www.w3.org/2004/02/skos/core#definition": [
+ "http://purl.org/dc/terms/created": [
{
"@language": "en",
- "@value": "Accidental Misuse"
+ "@value": "2022-08-14"
}
],
- "http://www.w3.org/2004/02/skos/core#inScheme": [
+ "http://purl.org/dc/terms/creator": [
{
- "@id": "https://w3id.org/dpv/risk#risk-consequences-classes"
+ "@language": "en",
+ "@value": "Harshvardhan J. Pandit"
+ },
+ {
+ "@language": "en",
+ "@value": "Georg P. Krog"
+ },
+ {
+ "@language": "en",
+ "@value": "Paul Ryan"
+ },
+ {
+ "@language": "en",
+ "@value": "Rob Brennan"
+ },
+ {
+ "@language": "en",
+ "@value": "Delaram Golpayegani"
+ },
+ {
+ "@language": "en",
+ "@value": "Beatriz Esteves"
+ },
+ {
+ "@language": "en",
+ "@value": "Julian Flake"
}
],
- "http://www.w3.org/2004/02/skos/core#prefLabel": [
+ "http://purl.org/dc/terms/description": [
{
"@language": "en",
- "@value": "Accidental Misuse"
+ "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management"
}
- ]
- },
- {
- "@id": "https://w3id.org/dpv/risk#IdentityTheft",
- "@type": [
- "http://www.w3.org/2004/02/skos/core#Concept",
- "http://www.w3.org/2000/01/rdf-schema#Class",
- "https://w3id.org/dpv#RiskConcept"
],
- "http://purl.org/dc/terms/contributor": [
+ "http://purl.org/dc/terms/identifier": [
{
- "@value": "Harshvardhan J. Pandit"
+ "@value": "https://w3id.org/dpv/risk"
}
],
- "http://purl.org/dc/terms/created": [
+ "http://purl.org/dc/terms/issued": [
{
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
+ "@language": "en",
+ "@value": "2022-08-14"
}
],
- "http://purl.org/dc/terms/modified": [
- {
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-08-16"
- }
- ],
- "http://purl.org/dc/terms/source": [
- {
- "@id": "_:Nad476399871e41a5bd37e1133df27770"
- }
- ],
- "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
- {
- "@id": "https://w3id.org/dpv/risk#"
- }
- ],
- "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
- {
- "@language": "en",
- "@value": "accepted"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#broader": [
- {
- "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#definition": [
- {
- "@language": "en",
- "@value": "Something that acts as or causes Identity Theft"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#inScheme": [
- {
- "@id": "https://w3id.org/dpv/risk#risk-consequences-classes"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#prefLabel": [
- {
- "@language": "en",
- "@value": "Identity Theft"
- }
- ]
- },
- {
- "@id": "_:Nad476399871e41a5bd37e1133df27770",
- "@type": [
- "https://schema.org/WebPage"
- ],
- "https://schema.org/name": [
- {
- "@value": "ENISA Threat Taxonomy 2016"
- }
- ],
- "https://schema.org/url": [
- {
- "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view"
- }
- ]
- },
- {
- "@id": "https://w3id.org/dpv/risk#Sabotage",
- "@type": [
- "http://www.w3.org/2004/02/skos/core#Concept",
- "http://www.w3.org/2000/01/rdf-schema#Class",
- "https://w3id.org/dpv#RiskConcept"
- ],
- "http://purl.org/dc/terms/contributor": [
- {
- "@value": "Harshvardhan J. Pandit"
- }
- ],
- "http://purl.org/dc/terms/created": [
- {
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
- }
- ],
- "http://purl.org/dc/terms/modified": [
- {
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-08-16"
- }
- ],
- "http://purl.org/dc/terms/source": [
- {
- "@id": "_:Nddcd9454cd3f48779b8299743d6f1150"
- }
- ],
- "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
- {
- "@id": "https://w3id.org/dpv/risk#"
- }
- ],
- "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
- {
- "@language": "en",
- "@value": "accepted"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#broader": [
- {
- "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#definition": [
- {
- "@language": "en",
- "@value": "Something that acts as or causes Sabotage"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#inScheme": [
- {
- "@id": "https://w3id.org/dpv/risk#risk-consequences-classes"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#prefLabel": [
- {
- "@language": "en",
- "@value": "Sabotage"
- }
- ]
- },
- {
- "@id": "_:Nddcd9454cd3f48779b8299743d6f1150",
- "@type": [
- "https://schema.org/WebPage"
- ],
- "https://schema.org/name": [
- {
- "@value": "ENISA Reference Incident Classification Taxonomy 2018"
- }
- ],
- "https://schema.org/url": [
- {
- "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
- }
- ]
- },
- {
- "@id": "https://w3id.org/dpv/risk#UnauthorisedReidentification",
- "@type": [
- "http://www.w3.org/2004/02/skos/core#Concept",
- "http://www.w3.org/2000/01/rdf-schema#Class",
- "https://w3id.org/dpv#RiskConcept"
- ],
- "http://purl.org/dc/terms/contributor": [
- {
- "@value": "Georg P. Krog"
- }
- ],
- "http://purl.org/dc/terms/created": [
+ "http://purl.org/dc/terms/license": [
{
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-19"
+ "@id": "https://www.w3.org/copyright/document-license-2023/"
}
],
"http://purl.org/dc/terms/modified": [
- {
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-08-16"
- }
- ],
- "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
- {
- "@id": "https://w3id.org/dpv/risk#"
- }
- ],
- "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
- {
- "@language": "en",
- "@value": "accepted"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#broader": [
- {
- "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#definition": [
- {
- "@language": "en",
- "@value": "Something that acts as or causes Unauthorised Re-Identification"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#inScheme": [
- {
- "@id": "https://w3id.org/dpv/risk#risk-consequences-classes"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Unauthorised Re-Identification"
- }
- ]
- },
- {
- "@id": "https://w3id.org/dpv/risk#InterceptCommunications",
- "@type": [
- "http://www.w3.org/2004/02/skos/core#Concept",
- "http://www.w3.org/2000/01/rdf-schema#Class",
- "https://w3id.org/dpv#RiskConcept"
- ],
- "http://purl.org/dc/terms/contributor": [
- {
- "@value": "Harshvardhan J. Pandit"
- }
- ],
- "http://purl.org/dc/terms/created": [
- {
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
+ "@value": "2024-07-13"
}
],
- "http://purl.org/dc/terms/modified": [
+ "http://purl.org/dc/terms/publisher": [
{
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-08-16"
+ "@id": "https://www.w3.org/"
}
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N9ba04625c759479eba79e0016163e8e6"
- }
- ],
- "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
- {
- "@id": "https://w3id.org/dpv/risk#"
- }
- ],
- "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
- {
- "@language": "en",
- "@value": "modified"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#broader": [
- {
- "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#definition": [
- {
- "@language": "en",
- "@value": "Something that acts as or causes Interception of Communications"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#inScheme": [
- {
- "@id": "https://w3id.org/dpv/risk#risk-consequences-classes"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#prefLabel": [
- {
- "@language": "en",
- "@value": "Intercept Communications"
+ "@id": "https://www.w3.org/groups/cg/dpvcg/"
}
],
- "http://www.w3.org/2004/02/skos/core#scopeNote": [
+ "http://purl.org/dc/terms/title": [
{
"@language": "en",
- "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0"
- }
- ]
- },
- {
- "@id": "_:N9ba04625c759479eba79e0016163e8e6",
- "@type": [
- "https://schema.org/WebPage"
- ],
- "https://schema.org/name": [
- {
- "@value": "ISO/IEC 27005:2018"
- }
- ],
- "https://schema.org/url": [
- {
- "@value": "https://www.iso.org/standard/75281.html"
- }
- ]
- },
- {
- "@id": "https://w3id.org/dpv/risk#SocietalRisk",
- "@type": [
- "http://www.w3.org/2004/02/skos/core#Concept",
- "http://www.w3.org/2000/01/rdf-schema#Class",
- "https://w3id.org/dpv#RiskConcept"
- ],
- "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
- {
- "@id": "https://w3id.org/dpv/risk#"
+ "@value": "Risk Concepts"
}
],
- "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
+ "http://purl.org/ontology/bibo/doi": [
{
- "@language": "en",
- "@value": "accepted"
+ "@value": "10.5281/zenodo.12505841"
}
],
- "http://www.w3.org/2004/02/skos/core#broader": [
+ "http://purl.org/ontology/bibo/status": [
{
- "@id": "https://w3id.org/dpv#RiskConcept"
+ "@value": "http://purl.org/ontology/bibo/status/published"
}
],
- "http://www.w3.org/2004/02/skos/core#definition": [
+ "http://purl.org/vocab/vann/preferredNamespacePrefix": [
{
- "@language": "en",
- "@value": "Risks and issues that affect or have the potential to affect society at large or specific groups in society"
+ "@value": "risk"
}
],
- "http://www.w3.org/2004/02/skos/core#inScheme": [
+ "http://purl.org/vocab/vann/preferredNamespaceUri": [
{
- "@id": "https://w3id.org/dpv/risk#risk-consequences-classes"
+ "@value": "https://w3id.org/dpv/risk#"
}
],
- "http://www.w3.org/2004/02/skos/core#prefLabel": [
+ "http://www.w3.org/2000/01/rdf-schema#Label": [
{
"@language": "en",
- "@value": "Societal Risk"
- }
- ]
- },
- {
- "@id": "https://w3id.org/dpv/risk#MaliciousCodeAttack",
- "@type": [
- "http://www.w3.org/2004/02/skos/core#Concept",
- "http://www.w3.org/2000/01/rdf-schema#Class",
- "https://w3id.org/dpv#RiskConcept"
- ],
- "http://purl.org/dc/terms/contributor": [
- {
- "@value": "Harshvardhan J. Pandit"
- }
- ],
- "http://purl.org/dc/terms/created": [
- {
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
- }
- ],
- "http://purl.org/dc/terms/modified": [
- {
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-08-16"
- }
- ],
- "http://purl.org/dc/terms/source": [
- {
- "@id": "_:N7beef942706b41468112e467b91c5f39"
- }
- ],
- "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
- {
- "@id": "https://w3id.org/dpv/risk#"
+ "@value": "RISK"
}
],
- "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
+ "http://www.w3.org/2002/07/owl#versionIRI": [
{
- "@language": "en",
- "@value": "accepted"
+ "@id": "https://w3id.org/dpv/2.1-dev/risk"
}
],
- "http://www.w3.org/2004/02/skos/core#broader": [
+ "http://www.w3.org/2002/07/owl#versionInfo": [
{
- "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
+ "@value": "2.1-dev"
}
],
- "http://www.w3.org/2004/02/skos/core#definition": [
+ "http://www.w3.org/ns/dx/prof/hasResource": [
{
- "@language": "en",
- "@value": "Something that acts as or causes Malicious Code Attack"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#inScheme": [
+ "@id": "https://w3id.org/dpv/primer"
+ },
{
- "@id": "https://w3id.org/dpv/risk#risk-consequences-classes"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#prefLabel": [
+ "@id": "https://w3id.org/dpv/guides"
+ },
{
- "@language": "en",
- "@value": "Malicious Code Attack"
- }
- ]
- },
- {
- "@id": "_:N7beef942706b41468112e467b91c5f39",
- "@type": [
- "https://schema.org/WebPage"
- ],
- "https://schema.org/name": [
+ "@id": "https://w3id.org/dpv/examples"
+ },
{
- "@value": "ENISA Reference Incident Classification Taxonomy 2018"
- }
- ],
- "https://schema.org/url": [
+ "@id": "https://w3id.org/dpv/risk#serialisation-html"
+ },
{
- "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
- }
- ]
- },
- {
- "@id": "https://w3id.org/dpv/risk#ViolatingPolicy",
- "@type": [
- "http://www.w3.org/2004/02/skos/core#Concept",
- "http://www.w3.org/2000/01/rdf-schema#Class",
- "https://w3id.org/dpv#RiskConcept"
- ],
- "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
+ "@id": "https://w3id.org/dpv/risk#serialisation-rdf"
+ },
{
- "@id": "https://w3id.org/dpv/risk#"
- }
- ],
- "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
+ "@id": "https://w3id.org/dpv/risk#serialisation-ttl"
+ },
{
- "@language": "en",
- "@value": "accepted"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#broader": [
+ "@id": "https://w3id.org/dpv/risk#serialisation-n3"
+ },
{
- "@id": "https://w3id.org/dpv/risk#LegalRisk"
+ "@id": "https://w3id.org/dpv/risk#serialisation-jsonld"
}
],
- "http://www.w3.org/2004/02/skos/core#definition": [
+ "http://www.w3.org/ns/dx/prof/isProfileOf": [
{
- "@language": "en",
- "@value": "Something that acts as or causes violation of policy which can be either internal or external policy"
+ "@id": "http://www.w3.org/2000/01/rdf-schema#"
+ },
+ {
+ "@id": "http://www.w3.org/2004/02/skos/core#"
+ },
+ {
+ "@id": "https://w3id.org/dpv"
}
],
- "http://www.w3.org/2004/02/skos/core#inScheme": [
+ "http://xmlns.com/foaf/0.1/logo": [
{
- "@id": "https://w3id.org/dpv/risk#risk-consequences-classes"
+ "@id": "https://w3id.org/dpv/media/logo.png"
}
],
- "http://www.w3.org/2004/02/skos/core#prefLabel": [
+ "https://schema.org/version": [
{
- "@language": "en",
- "@value": "Violating Policy"
+ "@value": "2.1-dev"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#LoseCredibility",
+ "@id": "https://w3id.org/dpv/risk#PsychologicalHarm",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -7270,7 +7287,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N347037135ba54cefae0a2a69a47e52d9"
+ "@id": "_:N0ddf524630684b719d7f03f907c20cff"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -7286,13 +7303,13 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#ReputationalRisk"
+ "@id": "https://w3id.org/dpv/risk#IndividualRisk"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Loss of Credibility"
+ "@value": "Something that acts as or causes Psychological Harm"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -7303,63 +7320,28 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Lose of Credibility"
+ "@value": "Psychological Harm"
}
]
},
{
- "@id": "_:N347037135ba54cefae0a2a69a47e52d9",
+ "@id": "_:N0ddf524630684b719d7f03f907c20cff",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ISO/IEC 27005:2018"
+ "@value": "ENISA Reference Incident Classification Taxonomy 2018"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.iso.org/standard/75281.html"
- }
- ]
- },
- {
- "@id": "https://w3id.org/dpv/risk#PhysicalHarm",
- "@type": [
- "http://www.w3.org/2004/02/skos/core#Concept",
- "http://www.w3.org/2000/01/rdf-schema#Class",
- "https://w3id.org/dpv#RiskConcept"
- ],
- "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
- {
- "@id": "https://w3id.org/dpv/risk#"
- }
- ],
- "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
- {
- "@language": "en",
- "@value": "accepted"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#broader": [
- {
- "@id": "https://w3id.org/dpv/risk#IndividualRisk"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#inScheme": [
- {
- "@id": "https://w3id.org/dpv/risk#risk-consequences-classes"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#prefLabel": [
- {
- "@language": "en",
- "@value": "Physical Harm"
+ "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#Terrorism",
+ "@id": "https://w3id.org/dpv/risk#Benefit",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -7367,13 +7349,13 @@
],
"http://purl.org/dc/terms/contributor": [
{
- "@value": "Harshvardhan J. Pandit"
+ "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres"
}
],
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
+ "@value": "2022-03-23"
}
],
"http://purl.org/dc/terms/modified": [
@@ -7382,11 +7364,6 @@
"@value": "2024-08-16"
}
],
- "http://purl.org/dc/terms/source": [
- {
- "@id": "_:Nf6a25073f9274363bcb649fe8540fc70"
- }
- ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk#"
@@ -7400,13 +7377,13 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#SocietalRisk"
+ "@id": "https://w3id.org/dpv/risk#FinancialImpact"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Terrorism"
+ "@value": "Something that acts as or causes benefits"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -7417,32 +7394,33 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Terrorism"
+ "@value": "Benefit"
}
]
},
{
- "@id": "_:Nf6a25073f9274363bcb649fe8540fc70",
+ "@id": "https://w3id.org/dpv/risk#Detriment",
"@type": [
- "https://schema.org/WebPage"
+ "http://www.w3.org/2004/02/skos/core#Concept",
+ "http://www.w3.org/2000/01/rdf-schema#Class",
+ "https://w3id.org/dpv#RiskConcept"
],
- "https://schema.org/name": [
+ "http://purl.org/dc/terms/contributor": [
{
- "@value": "ISO/IEC 27005:2018"
+ "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves"
}
],
- "https://schema.org/url": [
+ "http://purl.org/dc/terms/created": [
{
- "@value": "https://www.iso.org/standard/75281.html"
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2022-03-23"
+ }
+ ],
+ "http://purl.org/dc/terms/modified": [
+ {
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2024-08-16"
}
- ]
- },
- {
- "@id": "https://w3id.org/dpv/risk#IntentionalMisuse",
- "@type": [
- "http://www.w3.org/2004/02/skos/core#Concept",
- "http://www.w3.org/2000/01/rdf-schema#Class",
- "https://w3id.org/dpv#RiskConcept"
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
@@ -7457,13 +7435,13 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#UserRisks"
+ "@id": "https://w3id.org/dpv/risk#LegalRisk"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Intentional Misuse"
+ "@value": "Something that acts as or causes Detriment"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -7474,12 +7452,12 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Intentional Misuse"
+ "@value": "Detriment"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#Benefit",
+ "@id": "https://w3id.org/dpv/risk#Payment",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -7487,13 +7465,13 @@
],
"http://purl.org/dc/terms/contributor": [
{
- "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres"
+ "@value": "Georg P. Krog, Harshvardhan J. Pandit"
}
],
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-03-23"
+ "@value": "2024-04-14"
}
],
"http://purl.org/dc/terms/modified": [
@@ -7521,7 +7499,7 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes benefits"
+ "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -7532,12 +7510,12 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Benefit"
+ "@value": "Payment"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk",
+ "@id": "https://w3id.org/dpv/risk#SocietalHealthSafety",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -7556,13 +7534,7 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv#RiskConcept"
- }
- ],
- "http://www.w3.org/2004/02/skos/core#definition": [
- {
- "@language": "en",
- "@value": "Risks and issues that arise during operational processes"
+ "@id": "https://w3id.org/dpv/risk#SocietalRisk"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -7573,17 +7545,34 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Operational Security Risk"
+ "@value": "Societal Health & Safety"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#ComponentMalfunction",
+ "@id": "https://w3id.org/dpv/risk#RightsLimitation",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv#RiskConcept"
],
+ "http://purl.org/dc/terms/contributor": [
+ {
+ "@value": "Georg P. Krog, Harshvardhan J. Pandit"
+ }
+ ],
+ "http://purl.org/dc/terms/created": [
+ {
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2022-08-18"
+ }
+ ],
+ "http://purl.org/dc/terms/modified": [
+ {
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2024-08-16"
+ }
+ ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk#"
@@ -7597,13 +7586,13 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk"
+ "@id": "https://w3id.org/dpv/risk#SocietalRisk"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Component Malfunction"
+ "@value": "Something that acts as or causes Limitation of Rights"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -7614,18 +7603,18 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Component Malfunction"
+ "@value": "Limitation of Rights"
}
],
"http://www.w3.org/2004/02/skos/core#scopeNote": [
{
"@language": "en",
- "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of"
+ "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#Payment",
+ "@id": "https://w3id.org/dpv/risk#Blackmail",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -7633,13 +7622,13 @@
],
"http://purl.org/dc/terms/contributor": [
{
- "@value": "Georg P. Krog, Harshvardhan J. Pandit"
+ "@value": "Harshvardhan J. Pandit"
}
],
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-04-14"
+ "@value": "2022-08-17"
}
],
"http://purl.org/dc/terms/modified": [
@@ -7648,6 +7637,11 @@
"@value": "2024-08-16"
}
],
+ "http://purl.org/dc/terms/source": [
+ {
+ "@id": "_:N72e00e4999f548eb88bf909311860524"
+ }
+ ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk#"
@@ -7661,13 +7655,16 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#FinancialImpact"
+ "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources"
+ "@value": "Something that acts as or causes Blackmail"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -7678,12 +7675,28 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Payment"
+ "@value": "Blackmail"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#Fee",
+ "@id": "_:N72e00e4999f548eb88bf909311860524",
+ "@type": [
+ "https://schema.org/WebPage"
+ ],
+ "https://schema.org/name": [
+ {
+ "@value": "ISO/IEC 27005:2018"
+ }
+ ],
+ "https://schema.org/url": [
+ {
+ "@value": "https://www.iso.org/standard/75281.html"
+ }
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#PhysicalAssault",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -7691,13 +7704,13 @@
],
"http://purl.org/dc/terms/contributor": [
{
- "@value": "Georg P. Krog, Harshvardhan J. Pandit"
+ "@value": "Harshvardhan J. Pandit"
}
],
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-04-14"
+ "@value": "2022-08-17"
}
],
"http://purl.org/dc/terms/modified": [
@@ -7708,8 +7721,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@language": "en",
- "@value": "DGA 2.10"
+ "@id": "_:N6b8cf1ee50ba4ea081a101b53baf3bb3"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -7720,18 +7732,18 @@
"http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
{
"@language": "en",
- "@value": "modified"
+ "@value": "accepted"
}
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#FinancialImpact"
+ "@id": "https://w3id.org/dpv/risk#IndividualRisk"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or provides fees e.g. for using a service"
+ "@value": "Something that acts as or causes Physical Assault"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -7742,58 +7754,81 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Fee"
+ "@value": "Physical Assault"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat",
+ "@id": "_:N6b8cf1ee50ba4ea081a101b53baf3bb3",
"@type": [
- "http://www.w3.org/2004/02/skos/core#Concept",
- "http://www.w3.org/2000/01/rdf-schema#Class",
- "https://w3id.org/dpv#RiskConcept"
+ "https://schema.org/WebPage"
],
- "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
+ "https://schema.org/name": [
{
- "@id": "https://w3id.org/dpv/risk#"
+ "@value": "ISO/IEC 27005:2018"
}
],
- "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [
+ "https://schema.org/url": [
{
- "@language": "en",
- "@value": "accepted"
+ "@value": "https://www.iso.org/standard/75281.html"
+ }
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#serialisation-ttl",
+ "@type": [
+ "http://www.w3.org/ns/dx/prof/ResourceDescriptor"
+ ],
+ "http://purl.org/dc/terms/conformsTo": [
+ {
+ "@id": "https://www.w3.org/TR/turtle/"
}
],
- "http://www.w3.org/2004/02/skos/core#broader": [
+ "http://purl.org/dc/terms/format": [
{
- "@id": "https://w3id.org/dpv#RiskConcept"
+ "@id": "https://www.iana.org/assignments/media-types/text/turtle"
}
],
- "http://www.w3.org/2004/02/skos/core#definition": [
+ "http://purl.org/dc/terms/title": [
{
- "@language": "en",
- "@value": "Concepts associated with security threats that are likely to originate externally"
+ "@value": "Risk Concepts - Turtle serialiation"
}
],
- "http://www.w3.org/2004/02/skos/core#inScheme": [
+ "http://www.w3.org/ns/dx/prof/hasArtifact": [
{
- "@id": "https://w3id.org/dpv/risk#risk-consequences-classes"
+ "@id": "https://w3id.org/dpv/risk/risk.ttl"
}
],
- "http://www.w3.org/2004/02/skos/core#prefLabel": [
+ "http://www.w3.org/ns/dx/prof/hasRole": [
{
- "@language": "en",
- "@value": "External Security Threat"
+ "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#FinancialImpact",
+ "@id": "https://w3id.org/dpv/risk#MaterialDamage",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv#RiskConcept"
],
+ "http://purl.org/dc/terms/contributor": [
+ {
+ "@value": "Harshvardhan J. Pandit"
+ }
+ ],
+ "http://purl.org/dc/terms/created": [
+ {
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2022-03-30"
+ }
+ ],
+ "http://purl.org/dc/terms/modified": [
+ {
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2024-08-16"
+ }
+ ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk#"
@@ -7807,13 +7842,13 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv#RiskConcept"
+ "@id": "https://w3id.org/dpv/risk#LegalRisk"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Things that cause or have the potential to impact financial resources"
+ "@value": "Something that acts as or causes Material Damage"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -7824,12 +7859,18 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Financial Impact"
+ "@value": "Material Damage"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#scopeNote": [
+ {
+ "@language": "en",
+ "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#CopyrightViolation",
+ "@id": "https://w3id.org/dpv/risk#EquipmentFailure",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -7854,7 +7895,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N73922ea12cd34584b91e209f306167ae"
+ "@id": "_:N8e86fbf714a04b25a51dfcacec1cb10e"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -7870,13 +7911,16 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#LegalRisk"
+ "@id": "https://w3id.org/dpv/risk#AvailabilityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Copyright Violation"
+ "@value": "Something that acts as or causes Equipment Failure"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -7887,28 +7931,34 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Copyright Violation"
+ "@value": "Equipment Failure"
+ }
+ ],
+ "http://www.w3.org/2004/02/skos/core#scopeNote": [
+ {
+ "@language": "en",
+ "@value": "Here equipment refers to physical equipment"
}
]
},
{
- "@id": "_:N73922ea12cd34584b91e209f306167ae",
+ "@id": "_:N8e86fbf714a04b25a51dfcacec1cb10e",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ENISA Reference Incident Classification Taxonomy 2018"
+ "@value": "ISO/IEC 27005:2018"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
+ "@value": "https://www.iso.org/standard/75281.html"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#CompromiseAccount",
+ "@id": "https://w3id.org/dpv/risk#Scam",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -7933,7 +7983,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:N2ad682e6dc844471903bc2f55f3eaae7"
+ "@id": "_:Nea270aca30b44f5a8cfda049ee8bf631"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -7949,13 +7999,16 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk"
+ "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes a compromised account that is then used by the compromiser"
+ "@value": "Something that acts as or causes Scam"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -7966,54 +8019,62 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Compromise Account"
+ "@value": "Scam"
}
]
},
{
- "@id": "_:N2ad682e6dc844471903bc2f55f3eaae7",
+ "@id": "_:Nea270aca30b44f5a8cfda049ee8bf631",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ENISA Reference Incident Classification Taxonomy 2018"
+ "@value": "ISO/IEC 27005:2018"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
+ "@value": "https://www.iso.org/standard/75281.html"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#ErroneousSystemUse",
+ "@id": "https://w3id.org/dpv/risk#serialisation-html",
"@type": [
- "http://www.w3.org/2004/02/skos/core#Concept",
- "http://www.w3.org/2000/01/rdf-schema#Class",
- "https://w3id.org/dpv#RiskConcept"
+ "http://www.w3.org/ns/dx/prof/ResourceDescriptor"
],
- "http://purl.org/dc/terms/contributor": [
+ "http://purl.org/dc/terms/conformsTo": [
{
- "@value": "Harshvardhan J. Pandit"
+ "@id": "https://www.w3.org/TR/html/"
}
],
- "http://purl.org/dc/terms/created": [
+ "http://purl.org/dc/terms/format": [
{
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
+ "@id": "https://www.iana.org/assignments/media-types/text/html"
}
],
- "http://purl.org/dc/terms/modified": [
+ "http://purl.org/dc/terms/title": [
{
- "@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2024-08-16"
+ "@value": "Risk Concepts - HTML serialiation"
}
],
- "http://purl.org/dc/terms/source": [
+ "http://www.w3.org/ns/dx/prof/hasArtifact": [
+ {
+ "@id": "https://w3id.org/dpv/risk/risk.html"
+ }
+ ],
+ "http://www.w3.org/ns/dx/prof/hasRole": [
{
- "@id": "_:Ne874eff2b0f74da79392c36cf77d71f1"
+ "@id": "http://www.w3.org/ns/dx/prof/role/specification"
}
+ ]
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#IndividualRisk",
+ "@type": [
+ "http://www.w3.org/2004/02/skos/core#Concept",
+ "http://www.w3.org/2000/01/rdf-schema#Class"
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
@@ -8026,15 +8087,10 @@
"@value": "accepted"
}
],
- "http://www.w3.org/2004/02/skos/core#broader": [
- {
- "@id": "https://w3id.org/dpv/risk#UserRisks"
- }
- ],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Erroneous System Use"
+ "@value": "Risks and issues that affect or have the potential to affect specific individuals"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -8045,28 +8101,12 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Erroneous System Use"
- }
- ]
- },
- {
- "@id": "_:Ne874eff2b0f74da79392c36cf77d71f1",
- "@type": [
- "https://schema.org/WebPage"
- ],
- "https://schema.org/name": [
- {
- "@value": "ISO/IEC 27005:2018"
- }
- ],
- "https://schema.org/url": [
- {
- "@value": "https://www.iso.org/standard/75281.html"
+ "@value": "Individual Risk"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#VulnerabilityCreated",
+ "@id": "https://w3id.org/dpv/risk#RightsViolation",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -8074,13 +8114,13 @@
],
"http://purl.org/dc/terms/contributor": [
{
- "@value": "Harshvardhan J. Pandit"
+ "@value": "Georg P. Krog, Harshvardhan J. Pandit"
}
],
"http://purl.org/dc/terms/created": [
{
"@type": "http://www.w3.org/2001/XMLSchema#date",
- "@value": "2022-08-17"
+ "@value": "2022-08-18"
}
],
"http://purl.org/dc/terms/modified": [
@@ -8089,11 +8129,6 @@
"@value": "2024-08-16"
}
],
- "http://purl.org/dc/terms/source": [
- {
- "@id": "_:Nc0018c079b6b42619d869b3ae63ec70a"
- }
- ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk#"
@@ -8107,13 +8142,13 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#InternalSecurityThreat"
+ "@id": "https://w3id.org/dpv/risk#SocietalRisk"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Vulnerability Created"
+ "@value": "Something that acts as or causes Violation of Rights"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -8124,28 +8159,18 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Vulnerability Created"
- }
- ]
- },
- {
- "@id": "_:Nc0018c079b6b42619d869b3ae63ec70a",
- "@type": [
- "https://schema.org/WebPage"
- ],
- "https://schema.org/name": [
- {
- "@value": "ISO/IEC 27005:2018"
+ "@value": "Violation of Rights"
}
],
- "https://schema.org/url": [
+ "http://www.w3.org/2004/02/skos/core#scopeNote": [
{
- "@value": "https://www.iso.org/standard/75281.html"
+ "@language": "en",
+ "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#IdentityFraud",
+ "@id": "https://w3id.org/dpv/risk#DataBreach",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -8170,7 +8195,15 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:Nbc1a7f7ae94c4fde84913e9622b759f6"
+ "@id": "_:N0353966748ad43cc9b9c03081ec6b6f9"
+ }
+ ],
+ "http://purl.org/vocab/vann/example": [
+ {
+ "@id": "https://w3id.org/dpv/examples#E0069"
+ },
+ {
+ "@id": "https://w3id.org/dpv/examples#E0071"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -8186,13 +8219,22 @@
],
"http://www.w3.org/2004/02/skos/core#broader": [
{
- "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk"
+ "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#IntegrityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#AvailabilityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#SecurityBreach"
}
],
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Identity Fraud"
+ "@value": "Something that acts as or causes Data Breach"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -8203,28 +8245,28 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Identity Fraud"
+ "@value": "Data Breach"
}
]
},
{
- "@id": "_:Nbc1a7f7ae94c4fde84913e9622b759f6",
+ "@id": "_:N0353966748ad43cc9b9c03081ec6b6f9",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ENISA Threat Taxonomy 2016"
+ "@value": "ISO/IEC 27005:2018"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view"
+ "@value": "https://www.iso.org/standard/75281.html"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#UnauthorisedDataModification",
+ "@id": "https://w3id.org/dpv/risk#MalwareAttack",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
@@ -8249,7 +8291,7 @@
],
"http://purl.org/dc/terms/source": [
{
- "@id": "_:Naa83e8f3fb5e4e9a88398292112d68f3"
+ "@id": "_:N6fb9cc1510c4401a9c582949b7a8c8b7"
}
],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
@@ -8264,6 +8306,15 @@
}
],
"http://www.w3.org/2004/02/skos/core#broader": [
+ {
+ "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#IntegrityConcept"
+ },
+ {
+ "@id": "https://w3id.org/dpv/risk#AvailabilityConcept"
+ },
{
"@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
}
@@ -8271,7 +8322,7 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Unauthorised Data Modification"
+ "@value": "Something that acts as or causes Malware Attack"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -8282,33 +8333,55 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Unauthorised Data Modification"
+ "@value": "Malware Attack"
}
]
},
{
- "@id": "_:Naa83e8f3fb5e4e9a88398292112d68f3",
+ "@id": "_:N6fb9cc1510c4401a9c582949b7a8c8b7",
"@type": [
"https://schema.org/WebPage"
],
"https://schema.org/name": [
{
- "@value": "ENISA Reference Incident Classification Taxonomy 2018"
+ "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments"
}
],
"https://schema.org/url": [
{
- "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/"
+ "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment"
}
]
},
{
- "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity",
+ "@id": "https://w3id.org/dpv/risk#DenialServiceAttack",
"@type": [
"http://www.w3.org/2004/02/skos/core#Concept",
"http://www.w3.org/2000/01/rdf-schema#Class",
"https://w3id.org/dpv#RiskConcept"
],
+ "http://purl.org/dc/terms/contributor": [
+ {
+ "@value": "Harshvardhan J. Pandit"
+ }
+ ],
+ "http://purl.org/dc/terms/created": [
+ {
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2022-08-17"
+ }
+ ],
+ "http://purl.org/dc/terms/modified": [
+ {
+ "@type": "http://www.w3.org/2001/XMLSchema#date",
+ "@value": "2024-08-16"
+ }
+ ],
+ "http://purl.org/dc/terms/source": [
+ {
+ "@id": "_:N8705162a41ca472c9e3867ec5902de25"
+ }
+ ],
"http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [
{
"@id": "https://w3id.org/dpv/risk#"
@@ -8321,6 +8394,9 @@
}
],
"http://www.w3.org/2004/02/skos/core#broader": [
+ {
+ "@id": "https://w3id.org/dpv/risk#AvailabilityConcept"
+ },
{
"@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat"
}
@@ -8328,7 +8404,7 @@
"http://www.w3.org/2004/02/skos/core#definition": [
{
"@language": "en",
- "@value": "Something that acts as or causes Unauthorised Activity"
+ "@value": "Something that acts as or causes Denial of Service Attack (DoS)"
}
],
"http://www.w3.org/2004/02/skos/core#inScheme": [
@@ -8339,7 +8415,23 @@
"http://www.w3.org/2004/02/skos/core#prefLabel": [
{
"@language": "en",
- "@value": "Unauthorised Activity"
+ "@value": "Denial of Service Attack (DoS)"
+ }
+ ]
+ },
+ {
+ "@id": "_:N8705162a41ca472c9e3867ec5902de25",
+ "@type": [
+ "https://schema.org/WebPage"
+ ],
+ "https://schema.org/name": [
+ {
+ "@value": "ISO/IEC 27005:2018"
+ }
+ ],
+ "https://schema.org/url": [
+ {
+ "@value": "https://www.iso.org/standard/75281.html"
}
]
}
diff --git a/2.1-dev/risk/modules/risk_consequences.n3 b/2.1-dev/risk/modules/risk_consequences.n3
index b23e5df5b..87558834f 100644
--- a/2.1-dev/risk/modules/risk_consequences.n3
+++ b/2.1-dev/risk/modules/risk_consequences.n3
@@ -36,7 +36,9 @@ risk:AuthorisationFailure a rdfs:Class,
schema:url "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" ] ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:OperationalSecurityRisk ;
+ skos:broader risk:ConfidentialityConcept,
+ risk:IntegrityConcept,
+ risk:OperationalSecurityRisk ;
skos:definition "Something that acts as or causes Authorisation Failure"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Authorisation Failure"@en .
@@ -46,7 +48,8 @@ risk:AvailabilityBreach a rdfs:Class,
dpv:RiskConcept ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:DataBreach ;
+ skos:broader risk:AvailabilityConcept,
+ risk:DataBreach ;
skos:inScheme risk:risk-consequences-classes .
risk:Benefit a rdfs:Class,
@@ -73,7 +76,8 @@ risk:Blackmail a rdfs:Class,
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:ExternalSecurityThreat ;
+ skos:broader risk:ConfidentialityConcept,
+ risk:ExternalSecurityThreat ;
skos:definition "Something that acts as or causes Blackmail"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Blackmail"@en .
@@ -89,7 +93,9 @@ risk:BruteForceAuthorisations a rdfs:Class,
schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:ExternalSecurityThreat ;
+ skos:broader risk:ConfidentialityConcept,
+ risk:ExternalSecurityThreat,
+ risk:IntegrityConcept ;
skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Brute Force Authorisations"@en .
@@ -105,7 +111,8 @@ risk:Coercion a rdfs:Class,
schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:ExternalSecurityThreat ;
+ skos:broader risk:ConfidentialityConcept,
+ risk:ExternalSecurityThreat ;
skos:definition "Something that acts as or causes Coercion"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Coercion"@en .
@@ -128,7 +135,8 @@ risk:ComponentFailure a rdfs:Class,
dpv:RiskConcept ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:OperationalSecurityRisk ;
+ skos:broader risk:AvailabilityConcept,
+ risk:OperationalSecurityRisk ;
skos:definition "Something that acts as or causes Component Failure"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Component Failure"@en ;
@@ -139,7 +147,8 @@ risk:ComponentMalfunction a rdfs:Class,
dpv:RiskConcept ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:OperationalSecurityRisk ;
+ skos:broader risk:AvailabilityConcept,
+ risk:OperationalSecurityRisk ;
skos:definition "Something that acts as or causes Component Malfunction"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Component Malfunction"@en ;
@@ -156,7 +165,10 @@ risk:CompromiseAccount a rdfs:Class,
schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:OperationalSecurityRisk ;
+ skos:broader risk:AvailabilityConcept,
+ risk:ConfidentialityConcept,
+ risk:IntegrityConcept,
+ risk:OperationalSecurityRisk ;
skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Compromise Account"@en .
@@ -172,7 +184,8 @@ risk:CompromiseAccountCredentials a rdfs:Class,
schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:OperationalSecurityRisk ;
+ skos:broader risk:ConfidentialityConcept,
+ risk:OperationalSecurityRisk ;
skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Compromise Account Credentials"@en .
@@ -188,7 +201,8 @@ risk:ConfidentialityBreach a rdfs:Class,
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:DataBreach ;
+ skos:broader risk:ConfidentialityConcept,
+ risk:DataBreach ;
skos:definition "Something that acts as or causes Confidentiality Breach"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Confidentiality Breach"@en .
@@ -220,7 +234,8 @@ risk:Cryptojacking a rdfs:Class,
schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:ExternalSecurityThreat ;
+ skos:broader risk:AvailabilityConcept,
+ risk:ExternalSecurityThreat ;
skos:definition "Something that acts as or causes Cryptojacking"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Cryptojacking"@en .
@@ -251,7 +266,10 @@ risk:DataBreach a rdfs:Class,
dex:E0071 ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:SecurityBreach ;
+ skos:broader risk:AvailabilityConcept,
+ risk:ConfidentialityConcept,
+ risk:IntegrityConcept,
+ risk:SecurityBreach ;
skos:definition "Something that acts as or causes Data Breach"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Data Breach"@en .
@@ -267,7 +285,8 @@ risk:DataCorruption a rdfs:Class,
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk: ;
sw:term_status "modified"@en ;
- skos:broader risk:OperationalSecurityRisk ;
+ skos:broader risk:IntegrityConcept,
+ risk:OperationalSecurityRisk ;
skos:definition "Something that acts as or causes Corruption of Data"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Data Corruption"@en ;
@@ -280,14 +299,12 @@ risk:DenialServiceAttack a rdfs:Class,
dct:created "2022-08-17"^^xsd:date ;
dct:modified "2024-08-16"^^xsd:date ;
dct:source [ a schema:WebPage ;
- schema:name "ISO/IEC 27005:2018" ;
- schema:url "https://www.iso.org/standard/75281.html" ],
- [ a schema:WebPage ;
schema:name "ISO/IEC 27005:2018" ;
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:ExternalSecurityThreat ;
+ skos:broader risk:AvailabilityConcept,
+ risk:ExternalSecurityThreat ;
skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Denial of Service Attack (DoS)"@en .
@@ -329,7 +346,8 @@ risk:DistributedDenialServiceAttack a rdfs:Class,
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:ExternalSecurityThreat ;
+ skos:broader risk:AvailabilityConcept,
+ risk:ExternalSecurityThreat ;
skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en .
@@ -355,7 +373,8 @@ risk:EquipmentFailure a rdfs:Class,
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:OperationalSecurityRisk ;
+ skos:broader risk:AvailabilityConcept,
+ risk:OperationalSecurityRisk ;
skos:definition "Something that acts as or causes Equipment Failure"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Equipment Failure"@en ;
@@ -372,7 +391,8 @@ risk:EquipmentMalfunction a rdfs:Class,
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:OperationalSecurityRisk ;
+ skos:broader risk:AvailabilityConcept,
+ risk:OperationalSecurityRisk ;
skos:definition "Something that acts as or causes Equipment Malfunction"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Equipment Malfunction"@en ;
@@ -432,7 +452,8 @@ risk:Extorsion a rdfs:Class,
schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:ExternalSecurityThreat ;
+ skos:broader risk:ConfidentialityConcept,
+ risk:ExternalSecurityThreat ;
skos:definition "Something that acts as or causes Extorsion"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Extorsion"@en .
@@ -488,7 +509,8 @@ risk:Fraud a rdfs:Class,
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:ExternalSecurityThreat ;
+ skos:broader risk:ConfidentialityConcept,
+ risk:ExternalSecurityThreat ;
skos:definition "Something that acts as or causes Fraud"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Fraud"@en .
@@ -534,7 +556,8 @@ risk:IdentityFraud a rdfs:Class,
schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:OperationalSecurityRisk ;
+ skos:broader risk:ConfidentialityConcept,
+ risk:OperationalSecurityRisk ;
skos:definition "Something that acts as or causes Identity Fraud"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Identity Fraud"@en .
@@ -550,7 +573,8 @@ risk:IdentityTheft a rdfs:Class,
schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:OperationalSecurityRisk ;
+ skos:broader risk:ConfidentialityConcept,
+ risk:OperationalSecurityRisk ;
skos:definition "Something that acts as or causes Identity Theft"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Identity Theft"@en .
@@ -610,7 +634,8 @@ risk:IntegrityBreach a rdfs:Class,
dpv:RiskConcept ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:DataBreach ;
+ skos:broader risk:DataBreach,
+ risk:IntegrityConcept ;
skos:inScheme risk:risk-consequences-classes .
risk:IntentionalMisuse a rdfs:Class,
@@ -634,22 +659,13 @@ risk:InterceptCommunications a rdfs:Class,
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk: ;
sw:term_status "modified"@en ;
- skos:broader risk:ExternalSecurityThreat ;
+ skos:broader risk:ConfidentialityConcept,
+ risk:ExternalSecurityThreat ;
skos:definition "Something that acts as or causes Interception of Communications"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Intercept Communications"@en ;
skos:scopeNote "This concept was called \"InterceptionCommunications\" in DPV 2.0"@en .
-risk:InternalSecurityThreat a rdfs:Class,
- skos:Concept,
- dpv:RiskConcept ;
- rdfs:isDefinedBy risk: ;
- sw:term_status "accepted"@en ;
- skos:broader dpv:RiskConcept ;
- skos:definition "Concepts associated with security threats and issues that originate within the organisation"@en ;
- skos:inScheme risk:risk-consequences-classes ;
- skos:prefLabel "Internal Security Threat"@en .
-
risk:JudicialCosts a rdfs:Class,
skos:Concept,
dpv:RiskConcept ;
@@ -803,7 +819,10 @@ risk:MaliciousCodeAttack a rdfs:Class,
schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:ExternalSecurityThreat ;
+ skos:broader risk:AvailabilityConcept,
+ risk:ConfidentialityConcept,
+ risk:ExternalSecurityThreat,
+ risk:IntegrityConcept ;
skos:definition "Something that acts as or causes Malicious Code Attack"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Malicious Code Attack"@en .
@@ -819,7 +838,10 @@ risk:MalwareAttack a rdfs:Class,
schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:ExternalSecurityThreat ;
+ skos:broader risk:AvailabilityConcept,
+ risk:ConfidentialityConcept,
+ risk:ExternalSecurityThreat,
+ risk:IntegrityConcept ;
skos:definition "Something that acts as or causes Malware Attack"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Malware Attack"@en .
@@ -915,7 +937,8 @@ risk:PhishingScam a rdfs:Class,
schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:ExternalSecurityThreat ;
+ skos:broader risk:ConfidentialityConcept,
+ risk:ExternalSecurityThreat ;
skos:definition "Something that acts as or causes Phishing Scam"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Phishing Scam"@en .
@@ -994,7 +1017,8 @@ risk:Reidentification a rdfs:Class,
dct:modified "2024-08-16"^^xsd:date ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:OperationalSecurityRisk ;
+ skos:broader risk:ConfidentialityConcept,
+ risk:OperationalSecurityRisk ;
skos:definition "Something that acts as or causes Re-identification"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Re-identification"@en ;
@@ -1107,7 +1131,9 @@ risk:Sabotage a rdfs:Class,
schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:ExternalSecurityThreat ;
+ skos:broader risk:AvailabilityConcept,
+ risk:ExternalSecurityThreat,
+ risk:IntegrityConcept ;
skos:definition "Something that acts as or causes Sabotage"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Sabotage"@en .
@@ -1123,7 +1149,8 @@ risk:Scam a rdfs:Class,
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:ExternalSecurityThreat ;
+ skos:broader risk:ConfidentialityConcept,
+ risk:ExternalSecurityThreat ;
skos:definition "Something that acts as or causes Scam"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Scam"@en .
@@ -1133,7 +1160,10 @@ risk:SecurityAttack a rdfs:Class,
dpv:RiskConcept ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:ExternalSecurityThreat ;
+ skos:broader risk:AvailabilityConcept,
+ risk:ConfidentialityConcept,
+ risk:ExternalSecurityThreat,
+ risk:IntegrityConcept ;
skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Security Attack"@en .
@@ -1149,7 +1179,10 @@ risk:SecurityBreach a rdfs:Class,
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:OperationalSecurityRisk ;
+ skos:broader risk:AvailabilityConcept,
+ risk:ConfidentialityConcept,
+ risk:IntegrityConcept,
+ risk:OperationalSecurityRisk ;
skos:definition "Something that acts as or causes Security Breach"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Security Breach"@en .
@@ -1216,7 +1249,9 @@ risk:Spoofing a rdfs:Class,
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:ExternalSecurityThreat,
+ skos:broader risk:ConfidentialityConcept,
+ risk:ExternalSecurityThreat,
+ risk:IntegrityConcept,
risk:OperationalSecurityRisk ;
skos:definition "Something that acts as or causes Spoofing"@en ;
skos:inScheme risk:risk-consequences-classes ;
@@ -1233,7 +1268,8 @@ risk:SystemFailure a rdfs:Class,
schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:OperationalSecurityRisk ;
+ skos:broader risk:AvailabilityConcept,
+ risk:OperationalSecurityRisk ;
skos:definition "Something that acts as or causes System Failure"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "System Failure"@en ;
@@ -1250,7 +1286,10 @@ risk:SystemIntrusion a rdfs:Class,
schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:ExternalSecurityThreat ;
+ skos:broader risk:AvailabilityConcept,
+ risk:ConfidentialityConcept,
+ risk:ExternalSecurityThreat,
+ risk:IntegrityConcept ;
skos:definition "Something that acts as or causes System Intrusion"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "System Intrusion"@en .
@@ -1266,7 +1305,8 @@ risk:SystemMalfunction a rdfs:Class,
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:OperationalSecurityRisk ;
+ skos:broader risk:AvailabilityConcept,
+ risk:OperationalSecurityRisk ;
skos:definition "Something that acts as or causes System Malfunction"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "System Malfunction"@en ;
@@ -1299,7 +1339,10 @@ risk:UnauthorisedAccesstoPremises a rdfs:Class,
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:ExternalSecurityThreat ;
+ skos:broader risk:AvailabilityConcept,
+ risk:ConfidentialityConcept,
+ risk:ExternalSecurityThreat,
+ risk:IntegrityConcept ;
skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Unauthorised Access to Premises"@en .
@@ -1309,7 +1352,10 @@ risk:UnauthorisedActivity a rdfs:Class,
dpv:RiskConcept ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:ExternalSecurityThreat ;
+ skos:broader risk:AvailabilityConcept,
+ risk:ConfidentialityConcept,
+ risk:ExternalSecurityThreat,
+ risk:IntegrityConcept ;
skos:definition "Something that acts as or causes Unauthorised Activity"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Unauthorised Activity"@en .
@@ -1325,7 +1371,9 @@ risk:UnauthorisedCodeAccess a rdfs:Class,
schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:ExternalSecurityThreat ;
+ skos:broader risk:ConfidentialityConcept,
+ risk:ExternalSecurityThreat,
+ risk:IntegrityConcept ;
skos:definition "Something that acts as or causes Unauthorised Code Access"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Unauthorised Code Access"@en .
@@ -1341,7 +1389,8 @@ risk:UnauthorisedCodeDisclosure a rdfs:Class,
schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:ExternalSecurityThreat ;
+ skos:broader risk:ConfidentialityConcept,
+ risk:ExternalSecurityThreat ;
skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Unauthorised Code Disclosure"@en .
@@ -1357,7 +1406,8 @@ risk:UnauthorisedCodeModification a rdfs:Class,
schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:ExternalSecurityThreat ;
+ skos:broader risk:ExternalSecurityThreat,
+ risk:IntegrityConcept ;
skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Unauthorised Code Modification"@en .
@@ -1373,7 +1423,8 @@ risk:UnauthorisedDataAccess a rdfs:Class,
schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:ExternalSecurityThreat ;
+ skos:broader risk:ConfidentialityConcept,
+ risk:ExternalSecurityThreat ;
skos:definition "Something that acts as or causes Unauthorised Data Access"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Unauthorised Data Access"@en .
@@ -1389,7 +1440,8 @@ risk:UnauthorisedDataDisclosure a rdfs:Class,
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:ExternalSecurityThreat ;
+ skos:broader risk:ConfidentialityConcept,
+ risk:ExternalSecurityThreat ;
skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Unauthorised Data Disclosure"@en .
@@ -1405,7 +1457,8 @@ risk:UnauthorisedDataModification a rdfs:Class,
schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:ExternalSecurityThreat ;
+ skos:broader risk:ExternalSecurityThreat,
+ risk:IntegrityConcept ;
skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Unauthorised Data Modification"@en .
@@ -1421,7 +1474,8 @@ risk:UnauthorisedInformationDisclosure a rdfs:Class,
schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:ExternalSecurityThreat ;
+ skos:broader risk:ConfidentialityConcept,
+ risk:ExternalSecurityThreat ;
skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Unauthorised Information Disclosure"@en .
@@ -1434,7 +1488,8 @@ risk:UnauthorisedReidentification a rdfs:Class,
dct:modified "2024-08-16"^^xsd:date ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:ExternalSecurityThreat ;
+ skos:broader risk:ConfidentialityConcept,
+ risk:ExternalSecurityThreat ;
skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Unauthorised Re-Identification"@en .
@@ -1450,7 +1505,8 @@ risk:UnauthorisedResourceUse a rdfs:Class,
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:ExternalSecurityThreat ;
+ skos:broader risk:AvailabilityConcept,
+ risk:ExternalSecurityThreat ;
skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Unauthorised Resource Use"@en .
@@ -1466,7 +1522,9 @@ risk:UnauthorisedSystemAccess a rdfs:Class,
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:ExternalSecurityThreat ;
+ skos:broader risk:ConfidentialityConcept,
+ risk:ExternalSecurityThreat,
+ risk:IntegrityConcept ;
skos:definition "Something that acts as or causes Unauthorised System Access"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Unauthorised System Access"@en .
@@ -1482,7 +1540,8 @@ risk:UnauthorisedSystemModification a rdfs:Class,
schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:ExternalSecurityThreat ;
+ skos:broader risk:ExternalSecurityThreat,
+ risk:IntegrityConcept ;
skos:definition "Something that acts as or causes Unauthorised System Modification"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Unauthorised System Modification"@en .
@@ -1498,7 +1557,9 @@ risk:UnwantedCodeDeletion a rdfs:Class,
schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:ExternalSecurityThreat ;
+ skos:broader risk:AvailabilityConcept,
+ risk:ExternalSecurityThreat,
+ risk:IntegrityConcept ;
skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Unwanted Code Deletion"@en .
@@ -1514,7 +1575,9 @@ risk:UnwantedDataDeletion a rdfs:Class,
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:ExternalSecurityThreat ;
+ skos:broader risk:AvailabilityConcept,
+ risk:ExternalSecurityThreat,
+ risk:IntegrityConcept ;
skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Unwanted Data Deletion"@en .
@@ -1530,7 +1593,8 @@ risk:UnwantedDisclosureData a rdfs:Class,
schema:url "https://www.iso.org/standard/75281.html" ] ;
rdfs:isDefinedBy risk: ;
sw:term_status "accepted"@en ;
- skos:broader risk:ExternalSecurityThreat ;
+ skos:broader risk:ConfidentialityConcept,
+ risk:ExternalSecurityThreat ;
skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ;
skos:inScheme risk:risk-consequences-classes ;
skos:prefLabel "Unwanted Disclosure of Data"@en .
@@ -1657,22 +1721,6 @@ risk:ViolenceAgainstChildren a rdfs:Class,
skos:prefLabel "Violence against children"@en ;
skos:scopeNote "This concept was called \"ChildViolence\" in DPV 2.0"@en .
-risk:VulnerabilityCreated a rdfs:Class,
- skos:Concept,
- dpv:RiskConcept ;
- dct:contributor "Harshvardhan J. Pandit" ;
- dct:created "2022-08-17"^^xsd:date ;
- dct:modified "2024-08-16"^^xsd:date ;
- dct:source [ a schema:WebPage ;
- schema:name "ISO/IEC 27005:2018" ;
- schema:url "https://www.iso.org/standard/75281.html" ] ;
- rdfs:isDefinedBy risk: ;
- sw:term_status "accepted"@en ;
- skos:broader risk:InternalSecurityThreat ;
- skos:definition "Something that acts as or causes Vulnerability Created"@en ;
- skos:inScheme risk:risk-consequences-classes ;
- skos:prefLabel "Vulnerability Created"@en .
-
a owl:Ontology,
profile:Profile ;
dct:bibliographicCitation "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" ;
diff --git a/2.1-dev/risk/modules/risk_consequences.rdf b/2.1-dev/risk/modules/risk_consequences.rdf
index 4b756e8b0..0e164a9c5 100644
--- a/2.1-dev/risk/modules/risk_consequences.rdf
+++ b/2.1-dev/risk/modules/risk_consequences.rdf
@@ -12,14 +12,26 @@
xmlns:sw="http://www.w3.org/2003/06/sw-vocab-status/ns#"
xmlns:vann="http://purl.org/vocab/vann/"
>
-
+
- Physical Assault
- Something that acts as or causes Physical Assault
-
-
+ Judicial Costs
+ Something that involves or causes judicial costs to be paid
+
+ accepted
+
+
+
+
+
+
+
+ Blackmail
+ Something that acts as or causes Blackmail
+
+
+
2022-08-17
2024-08-16
accepted
@@ -27,73 +39,80 @@
-
+
- Lose of Negotiating Capacity
- Something that acts as or causes Loss of Negotiating Capacity
-
-
+ Violation of Contractual Obligation
+ Something that acts as or causes Violation of Contractual Obligations
+
+ This concept was called "ViolationContractualObligations" in DPV 2.0
+
2022-08-17
2024-08-16
- accepted
+ modified
Harshvardhan J. Pandit
-
+
- Remuneration
- Something that acts as or provides renumeration which is in monetary or financial form
+ Fee
+ Something that acts as or provides fees e.g. for using a service
+ DGA 2.10
2024-04-14
2024-08-16
- accepted
+ modified
Georg P. Krog, Harshvardhan J. Pandit
-
-
- ENISA Reference Incident Classification Taxonomy 2018
- https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/
-
-
+
- Social Disadvantage
- Something that acts as or causes Social Disadvantage
-
- 2022-08-19
- 2024-08-16
+ Component Malfunction
+ Something that acts as or causes Component Malfunction
+
+
+ Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of
accepted
- Georg P. Krog
-
+
+
+ ISO/IEC 27005:2018
+ https://www.iso.org/standard/75281.html
+
+
- Societal Risk
- Risks and issues that affect or have the potential to affect society at large or specific groups in society
-
+ Identity Fraud
+ Something that acts as or causes Identity Fraud
+
+
+
+ 2022-08-17
+ 2024-08-16
accepted
+ Harshvardhan J. Pandit
-
+
- Lose of Reputation
- Something that acts as or causes Loss of Reputation
-
-
+ Cryptojacking
+ Something that acts as or causes Cryptojacking
+
+
+
2022-08-17
2024-08-16
accepted
@@ -101,14 +120,15 @@
-
+
- Phishing Scam
- Something that acts as or causes Phishing Scam
+ Distributed Denial of Service Attack (DDoS)
+ Something that acts as or causes Distributed Denial of Service Attack (DDoS)
+
-
+
2022-08-17
2024-08-16
accepted
@@ -116,24 +136,33 @@
-
+
- Physical Harm
-
+ Re-identification
+ Something that acts as or causes Re-identification
+
+
+ Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification
+ 2022-08-19
+ 2024-08-16
accepted
+ Harshvardhan J. Pandit
-
+
- Compromise Account Credentials
- Something that acts as or causes Account Credentials to be compromised
-
-
+ Unauthorised Access to Premises
+ Something that acts as or causes Unauthorised Access to Premises
+
+
+
+
+
2022-08-17
2024-08-16
accepted
@@ -141,38 +170,32 @@
-
+
- System Failure
- Something that acts as or causes System Failure
+ Data Corruption
+ Something that acts as or causes Corruption of Data
+
- Here system refers to both hardware and software systems
-
+ This concept was called "Corruption Data" in DPV 2.0
+
2022-08-17
2024-08-16
- accepted
+ modified
Harshvardhan J. Pandit
-
-
-
-
-
-
- Risk Concepts - HTML serialiation
-
-
+
- Unwanted Data Deletion
- Something that acts as or causes Unwanted Data Deletion
+ Unauthorised Data Access
+ Something that acts as or causes Unauthorised Data Access
+
-
+
2022-08-17
2024-08-16
accepted
@@ -180,14 +203,16 @@
-
+
- Sabotage
- Something that acts as or causes Sabotage
-
-
+ Equipment Malfunction
+ Something that acts as or causes Equipment Malfunction
+
+
+ Here equipment refers to physical equipment
+
2022-08-17
2024-08-16
accepted
@@ -195,65 +220,65 @@
-
+
- Sexual Violence
- Something that acts as or causes Sexual Violence
-
-
- 2022-08-17
- 2024-08-16
+ Financial Impact
+ Things that cause or have the potential to impact financial resources
+
accepted
- Harshvardhan J. Pandit
-
+
- Violence against children
- Something that acts as or causes Child Violence
-
- This concept was called "ChildViolence" in DPV 2.0
-
- 2022-08-17
+ Damage
+ Something that acts as or causes Damage
+
+ 2022-03-30
2024-08-16
accepted
Harshvardhan J. Pandit
-
+
- Personal Safety Endangerment
- Something that acts as or causes Personal Safety Endangerment
+ Discrimination
+ Something that acts as or causes Discrimination
-
- 2022-08-17
+ 2022-08-19
2024-08-16
accepted
- Harshvardhan J. Pandit
+ Georg P. Krog
-
-
- ISO/IEC 27005:2018
- https://www.iso.org/standard/75281.html
+
+
+
+
+ Operational Security Risk
+ Risks and issues that arise during operational processes
+
+ accepted
+
+
-
+
- Fraud
- Something that acts as or causes Fraud
+ Unauthorised Code Modification
+ Something that acts as or causes Unauthorised Code Modification
+
-
+
2022-08-17
2024-08-16
accepted
@@ -261,86 +286,80 @@
-
+
- Data Breach
- Something that acts as or causes Data Breach
-
-
+ Violation of Legal Obligations
+ Something that acts as or causes Violation of Legal Obligations
+
+ This concept was called "ViolationRegulatoryObligations" in DPV 2.0
+
2022-08-17
2024-08-16
- accepted
+ modified
Harshvardhan J. Pandit
-
-
-
+
ENISA Reference Incident Classification Taxonomy 2018
https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/
-
+
- Material Damage
- Something that acts as or causes Material Damage
-
- The criteria for what is considered material damage is based in jurisdictional laws and norms
- 2022-03-30
+ Exposure to Harmful Speech
+ Something that acts as or causes Harmful Speech
+
+ This concept was called "HarmfulSpeech" in DPV 2.0
+
+ 2022-08-17
2024-08-16
accepted
Harshvardhan J. Pandit
-
-
- ISO/IEC 27005:2018
- https://www.iso.org/standard/75281.html
-
-
+
- Unauthorised Activity
- Something that acts as or causes Unauthorised Activity
-
+ System Failure
+ Something that acts as or causes System Failure
+
+
+ Here system refers to both hardware and software systems
+
+ 2022-08-17
+ 2024-08-16
accepted
+ Harshvardhan J. Pandit
-
+
- Detriment
- Something that acts as or causes Detriment
-
- 2022-03-23
- 2024-08-16
+ Privacy
+
accepted
- Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves
-
-
- ENISA Threat Landscape for Ransomware Attacks 2022
- https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks
-
-
+
- Copyright Violation
- Something that acts as or causes Copyright Violation
-
-
+ Brute Force Authorisations
+ Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques
+
+
+
+
2022-08-17
2024-08-16
accepted
@@ -348,71 +367,66 @@
-
-
- ENISA Threat Taxonomy 2016
- https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view
-
-
-
- ENISA Reference Incident Classification Taxonomy 2018
- https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/
-
-
+
- Societal Health & Safety
-
+ Sabotage
+ Something that acts as or causes Sabotage
+
+
+
+
+ 2022-08-17
+ 2024-08-16
accepted
+ Harshvardhan J. Pandit
-
-
- ISO/IEC 27005:2018
- https://www.iso.org/standard/75281.html
-
-
+
- Violation of Statutory Obligations
- Something that acts as or causes Violation of Statutory Obligations
-
- This concept was called "ViolationStatutoryObligations" in DPV 2.0
-
+ Unauthorised Code Disclosure
+ Something that acts as or causes Unauthorised Code Disclosure
+
+
+
2022-08-17
2024-08-16
- modified
+ accepted
Harshvardhan J. Pandit
-
+
- Violation of Contractual Obligation
- Something that acts as or causes Violation of Contractual Obligations
-
- This concept was called "ViolationContractualObligations" in DPV 2.0
-
+ Violence against children
+ Something that acts as or causes Child Violence
+
+ This concept was called "ChildViolence" in DPV 2.0
+
2022-08-17
2024-08-16
- modified
+ accepted
Harshvardhan J. Pandit
-
+
- Cryptojacking
- Something that acts as or causes Cryptojacking
+ System Intrusion
+ Something that acts as or causes System Intrusion
+
+
+
-
+
2022-08-17
2024-08-16
accepted
@@ -420,14 +434,20 @@
-
+
+
+ ISO/IEC 27005:2018
+ https://www.iso.org/standard/75281.html
+
+
- Lose of Goodwill
- Something that acts as or causes Loss of Goodwill
-
-
+ Unwanted Disclosure of Data
+ Something that acts as or causes Unwanted Disclosure of Data
+
+
+
2022-08-17
2024-08-16
accepted
@@ -435,114 +455,180 @@
-
+
- Violating Policy
- Something that acts as or causes violation of policy which can be either internal or external policy
-
+ Misuse
+ Something that acts as or causes Misuse
+
+ 2024-06-11
+ 2024-08-16
accepted
+ Delaram Golpayegani
-
+
+
+
+
+
+ Risk Concepts
+ http://purl.org/ontology/bibo/status/published
+ RISK
+ Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management
+ 2022-08-14
+ 2022-08-14
+ 2024-07-13
+ Harshvardhan J. Pandit
+ Georg P. Krog
+ Paul Ryan
+ Rob Brennan
+ Delaram Golpayegani
+ Beatriz Esteves
+ Julian Flake
+ 2.1-dev
+ 2.1-dev
+ https://w3id.org/dpv/risk
+ http://www.w3.org/2000/01/rdf-schema
+ http://www.w3.org/2004/02/skos/core
+ 10.5281/zenodo.12505841
+ Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426
+
+
+ Delaram Golpayegani
+ Fajar Ekaputra
+ Axel Polleres
+ Beatriz Esteves
+ Georg P. Krog
+ Julian Flake
+ Harshvardhan J. Pandit
+
+ risk
+ https://w3id.org/dpv/risk#
+
+
+
+
+
+
+
+
+
+
+
+
+
- External Security Threat
- Concepts associated with security threats that are likely to originate externally
-
+ Benefit
+ Something that acts as or causes benefits
+
+ 2022-03-23
+ 2024-08-16
accepted
+ Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres
-
+
- Lose of Opportunity
- Something that acts as or causes Loss of Opportunity
-
-
+ Intercept Communications
+ Something that acts as or causes Interception of Communications
+
+
+ This concept was called "InterceptionCommunications" in DPV 2.0
+
2022-08-17
2024-08-16
- accepted
+ modified
Harshvardhan J. Pandit
-
+
- Component Malfunction
- Something that acts as or causes Component Malfunction
-
- Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of
+ Lose of Opportunity
+ Something that acts as or causes Loss of Opportunity
+
+
+ 2022-08-17
+ 2024-08-16
accepted
+ Harshvardhan J. Pandit
-
+
- Identity Fraud
- Something that acts as or causes Identity Fraud
-
-
- 2022-08-17
- 2024-08-16
+
+
accepted
- Harshvardhan J. Pandit
-
+
+
+ ENISA Reference Incident Classification Taxonomy 2018
+ https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/
+
+
- Unwanted Disclosure of Data
- Something that acts as or causes Unwanted Disclosure of Data
-
-
- 2022-08-17
+ Harm
+ Something that acts as or causes Harm to humans
+
+ This concept refers to the general abstract notion of harm
+ 2022-08-13
2024-08-16
accepted
Harshvardhan J. Pandit
-
+
- Payment
- Something that acts as or provides payment e.g. to access a service or purchase resources
-
- 2024-04-14
+ Data Breach
+ Something that acts as or causes Data Breach
+
+
+
+
+
+ 2022-08-17
2024-08-16
accepted
- Georg P. Krog, Harshvardhan J. Pandit
+ Harshvardhan J. Pandit
+
+
-
+
ISO/IEC 27005:2018
https://www.iso.org/standard/75281.html
-
+
- Impact to Rights
- Something that acts as or causes Impact to Rights
-
-
- This concept was called "ImpactToRights" in DPV 2.0
-
+ Extorsion
+ Something that acts as or causes Extorsion
+
+
+
2022-08-17
2024-08-16
accepted
@@ -550,65 +636,56 @@
-
+
- Violation of Legal Obligations
- Something that acts as or causes Violation of Legal Obligations
-
- This concept was called "ViolationRegulatoryObligations" in DPV 2.0
-
+ Financial Loss
+ Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity
+
+
2022-08-17
2024-08-16
- modified
+ accepted
Harshvardhan J. Pandit
-
-
-
-
-
-
- Risk Concepts - Turtle serialiation
-
-
+
- Unauthorised Code Access
- Something that acts as or causes Unauthorised Code Access
-
-
- 2022-08-17
- 2024-08-16
+ Intentional Misuse
+ Intentional Misuse
+
accepted
- Harshvardhan J. Pandit
-
+
- Reputational Risk
- Risks and issues that affect the reputation of the organisation
-
+ Lose of Trust
+ Something that acts as or causes Loss of Trust
+
+
+ 2022-08-17
+ 2024-08-16
accepted
+ Harshvardhan J. Pandit
-
+
- Violating Code of Conduct
- Something that acts as or causes Violation of Code of Conduct
+ Violating Ethics Code
+ Something that acts as or causes Violation of Ethics Code
- This concept was called "ViolationCodeConduct" in DPV 2.0
-
+ This concept was called "ViolationEthicalCode" in DPV 2.0
+
2022-08-17
2024-08-16
modified
@@ -616,96 +693,85 @@
-
+
- Human Errors
- Something that acts as or causes Human Errors
-
-
- 2022-08-17
- 2024-08-16
- accepted
- Harshvardhan J. Pandit
-
-
-
-
-
-
-
- Re-identification
- Something that acts as or causes Re-identification
-
- Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification
- 2022-08-19
+ Unauthorised Data Disclosure
+ Something that acts as or causes Unauthorised Data Disclosure
+
+
+
+ 2022-08-17
2024-08-16
accepted
Harshvardhan J. Pandit
-
+
- ISO/IEC 27005:2018
- https://www.iso.org/standard/75281.html
-
-
-
- ISO/IEC 27005:2018
- https://www.iso.org/standard/75281.html
+ ENISa Trust Services Security Incidents 2021
+ https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021
-
+
- Intercept Communications
- Something that acts as or causes Interception of Communications
-
- This concept was called "InterceptionCommunications" in DPV 2.0
-
+ Compromise Account Credentials
+ Something that acts as or causes Account Credentials to be compromised
+
+
+
2022-08-17
2024-08-16
- modified
+ accepted
Harshvardhan J. Pandit
-
+
- Public Order Breach
- Something that acts as or causes Public Order Breach
+ Detriment
+ Something that acts as or causes Detriment
-
- 2022-08-17
+ 2022-03-23
2024-08-16
accepted
- Harshvardhan J. Pandit
+ Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves
-
+
- Financial Impact
- Things that cause or have the potential to impact financial resources
-
+ Psychological Harm
+ Something that acts as or causes Psychological Harm
+
+
+ 2022-08-17
+ 2024-08-16
accepted
+ Harshvardhan J. Pandit
-
+
+
+ ENISA Methodology for Sectoral Cybersecurity Assessments
+ https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment
+
+
- Malicious Code Attack
- Something that acts as or causes Malicious Code Attack
-
-
+ Personal Safety Endangerment
+ Something that acts as or causes Personal Safety Endangerment
+
+
2022-08-17
2024-08-16
accepted
@@ -713,14 +779,14 @@
-
+
- Security Breach
- Something that acts as or causes Security Breach
-
-
+ Injury
+ Something that acts as or causes Injury
+
+
2022-08-17
2024-08-16
accepted
@@ -728,14 +794,14 @@
-
+
- Confidentiality Breach
- Something that acts as or causes Confidentiality Breach
-
-
+ Copyright Violation
+ Something that acts as or causes Copyright Violation
+
+
2022-08-17
2024-08-16
accepted
@@ -743,19 +809,20 @@
-
+
- ISO/IEC 27005:2018
- https://www.iso.org/standard/75281.html
+ ENISA Reference Incident Classification Taxonomy 2018
+ https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/
-
+
- Identity Theft
- Something that acts as or causes Identity Theft
-
-
+ Unauthorised Data Modification
+ Something that acts as or causes Unauthorised Data Modification
+
+
+
2022-08-17
2024-08-16
accepted
@@ -763,44 +830,46 @@
-
+
- Damage
- Something that acts as or causes Damage
-
- 2022-03-30
+ Lose of Reputation
+ Something that acts as or causes Loss of Reputation
+
+
+ 2022-08-17
2024-08-16
accepted
Harshvardhan J. Pandit
-
+
- Limitation of Rights
- Something that acts as or causes Limitation of Rights
-
- This concept was called "LimitationOfRights" in DPV 2.0
- 2022-08-18
+ Confidentiality Breach
+ Something that acts as or causes Confidentiality Breach
+
+
+
+ 2022-08-17
2024-08-16
accepted
- Georg P. Krog, Harshvardhan J. Pandit
+ Harshvardhan J. Pandit
-
+
- Equipment Failure
- Something that acts as or causes Equipment Failure
-
- Here equipment refers to physical equipment
-
+ Fraud
+ Something that acts as or causes Fraud
+
+
+
2022-08-17
2024-08-16
accepted
@@ -808,19 +877,26 @@
-
+
ISO/IEC 27005:2018
https://www.iso.org/standard/75281.html
-
+
+
+ ISO/IEC 27005:2018
+ https://www.iso.org/standard/75281.html
+
+
- Unauthorised Data Disclosure
- Something that acts as or causes Unauthorised Data Disclosure
+ Unwanted Data Deletion
+ Something that acts as or causes Unwanted Data Deletion
+
+
-
+
2022-08-17
2024-08-16
accepted
@@ -843,28 +919,33 @@
-
+
- Unauthorised Re-Identification
- Something that acts as or causes Unauthorised Re-Identification
-
- 2022-08-19
+ Compromise Account
+ Something that acts as or causes a compromised account that is then used by the compromiser
+
+
+
+
+
+ 2022-08-17
2024-08-16
accepted
- Georg P. Krog
+ Harshvardhan J. Pandit
-
+
- Financial Loss
- Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity
-
-
+ Denial of Service Attack (DoS)
+ Something that acts as or causes Denial of Service Attack (DoS)
+
+
+
2022-08-17
2024-08-16
accepted
@@ -872,14 +953,14 @@
-
+
- Erroneous System Use
- Something that acts as or causes Erroneous System Use
-
-
+ Public Order Breach
+ Something that acts as or causes Public Order Breach
+
+
2022-08-17
2024-08-16
accepted
@@ -887,30 +968,22 @@
-
+
ISO/IEC 27005:2018
https://www.iso.org/standard/75281.html
-
-
- ENISA Methodology for Sectoral Cybersecurity Assessments
- https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment
-
-
-
- ENISA Threat Taxonomy 2016
- https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view
-
-
+
- Exposure to Harmful Speech
- Something that acts as or causes Harmful Speech
-
- This concept was called "HarmfulSpeech" in DPV 2.0
-
+ Malicious Code Attack
+ Something that acts as or causes Malicious Code Attack
+
+
+
+
+
2022-08-17
2024-08-16
accepted
@@ -918,164 +991,57 @@
-
-
-
-
- Judicial Costs
- Something that involves or causes judicial costs to be paid
-
- accepted
-
-
-
-
+
- Coercion
- Something that acts as or causes Coercion
-
-
- 2022-08-17
- 2024-08-16
+ Reputational Risk
+ Risks and issues that affect the reputation of the organisation
+
accepted
- Harshvardhan J. Pandit
-
-
-
-
-
- Risk Concepts
- http://purl.org/ontology/bibo/status/published
- RISK
- Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management
- 2022-08-14
- 2022-08-14
- 2024-07-13
- Harshvardhan J. Pandit
- Georg P. Krog
- Paul Ryan
- Rob Brennan
- Delaram Golpayegani
- Beatriz Esteves
- Julian Flake
- 2.1-dev
- 2.1-dev
- https://w3id.org/dpv/risk
- http://www.w3.org/2000/01/rdf-schema
- http://www.w3.org/2004/02/skos/core
- 10.5281/zenodo.12505841
- Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426
-
-
- Harshvardhan J. Pandit
- Georg P. Krog
- Beatriz Esteves
- Axel Polleres
- Fajar Ekaputra
- Delaram Golpayegani
- Julian Flake
-
- risk
- https://w3id.org/dpv/risk#
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Guides for Data Privacy Vocabulary
-
-
-
-
+
- Malware Attack
- Something that acts as or causes Malware Attack
+ Security Attack
+ Something that acts as or causes an attack on security with the aim of undermining it
+
+
+
-
- 2022-08-17
- 2024-08-16
accepted
- Harshvardhan J. Pandit
-
-
-
-
- Examples for Data Privacy Vocabulary
-
-
-
-
+
- Legal Risk
- Risks and issues that have their basis in legal requirements and enforcement
+ External Security Threat
+ Concepts associated with security threats that are likely to originate externally
accepted
-
-
-
-
- Violating Ethics Code
- Something that acts as or causes Violation of Ethics Code
-
- This concept was called "ViolationEthicalCode" in DPV 2.0
-
- 2022-08-17
- 2024-08-16
- modified
- Harshvardhan J. Pandit
-
-
-
-
+
- ENISA Reference Incident Classification Taxonomy 2018
- https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/
-
-
-
-
-
- Judicial Penalty
- Something that involves or causes judicial penalties to be paid
-
- accepted
-
-
+ ISO/IEC 27005:2018
+ https://www.iso.org/standard/75281.html
-
+
- Injury
- Something that acts as or causes Injury
-
-
+ Unwanted Code Deletion
+ Something that acts as or causes Unwanted Code Deletion
+
+
+
+
2022-08-17
2024-08-16
accepted
@@ -1083,14 +1049,14 @@
-
+
- Authorisation Failure
- Something that acts as or causes Authorisation Failure
-
-
+ Lose of Credibility
+ Something that acts as or causes Loss of Credibility
+
+
2022-08-17
2024-08-16
accepted
@@ -1098,14 +1064,15 @@
-
+
- Lose of Trust
- Something that acts as or causes Loss of Trust
-
-
+ Coercion
+ Something that acts as or causes Coercion
+
+
+
2022-08-17
2024-08-16
accepted
@@ -1113,62 +1080,73 @@
-
-
-
-
- Primer for Data Privacy Vocabulary
-
-
+
+