diff --git a/2.1-dev/risk/index-en.html b/2.1-dev/risk/index-en.html index c8b42bf5f..4efbea699 100644 --- a/2.1-dev/risk/index-en.html +++ b/2.1-dev/risk/index-en.html @@ -1271,92 +1271,77 @@

Consequences and Impacts

dpv:hasImpact risk:RightsImpact . -

The risk concepts taxonomy is broadly divided into the following categories:

+

The concepts taxonomy is broadly divided into the following categories:

-
-

InternalSecurityThreat

-
@@ -2128,8 +2364,6 @@

Classes

- - @@ -3007,6 +3241,12 @@

Authorisation Failure

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types + risk:IntegrityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -3088,6 +3328,33 @@

None

Broader/Parent types + risk:DataBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:IntegrityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:IntegrityConcept + + Broader/Parent types risk:DataBreachrisk:SecurityBreachrisk:OperationalSecurityRisk @@ -3392,6 +3659,9 @@

Blackmail

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -3473,8 +3743,14 @@

Brute Force Authorisations

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -3724,6 +4000,9 @@

Coercion

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -3883,6 +4162,9 @@

Component Failure

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -3955,6 +4237,9 @@

Component Malfunction

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -4027,6 +4312,15 @@

Compromise Account

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types + risk:IntegrityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -4108,6 +4402,9 @@

Compromise Account Credentials

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -4189,6 +4486,33 @@

Confidentiality Breach

Broader/Parent types + risk:DataBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:IntegrityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:IntegrityConcept + + Broader/Parent types risk:DataBreachrisk:SecurityBreachrisk:OperationalSecurityRisk @@ -4666,6 +4990,9 @@

Cryptojacking

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -4825,6 +5152,18 @@

Data Breach

Broader/Parent types + risk:SecurityBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:SecurityBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:SecurityBreach + → risk:IntegrityConcept + + Broader/Parent types risk:SecurityBreachrisk:OperationalSecurityRiskdpv:RiskConcept @@ -4910,6 +5249,9 @@

Data Corruption

Broader/Parent types + risk:IntegrityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -5069,6 +5411,9 @@

Denial of Service Attack (DoS)

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -5092,7 +5437,7 @@

Denial of Service Attack (DoS)

Source - ISO/IEC 27005:2018, ISO/IEC 27005:2018 + ISO/IEC 27005:2018 @@ -5385,6 +5730,9 @@

Distributed Denial of Service Attack (DDoS)

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -5609,6 +5957,9 @@

Equipment Failure

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -5693,6 +6044,9 @@

Equipment Malfunction

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -6012,6 +6366,9 @@

Extorsion

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -6815,6 +7172,9 @@

Fraud

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -7499,6 +7859,9 @@

Identity Fraud

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -7580,6 +7943,9 @@

Identity Theft

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -7862,7 +8228,7 @@

Incident

Date Created - 2024-02-14 + 2024-05-19 Date Modified @@ -9873,6 +10239,33 @@

None

Broader/Parent types + risk:DataBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:IntegrityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:IntegrityConcept + + Broader/Parent types risk:DataBreachrisk:SecurityBreachrisk:OperationalSecurityRisk @@ -10085,6 +10478,9 @@

Intercept Communications

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -10141,74 +10537,6 @@

Intercept Communications

-
-

Internal Security Threat

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
TermInternalSecurityThreatPrefixrisk
LabelInternal Security Threat
IRIhttps://w3id.org/dpv/risk#InternalSecurityThreat
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types dpv:RiskConcept -
DefinitionConcepts associated with security threats and issues that originate within the organisation
See More: section RISK-CONSEQUENCES in RISK -
-
- - - @@ -11284,8 +11612,17 @@

Malicious Code Attack

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -11365,8 +11702,17 @@

Malware Attack

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -12766,6 +13112,9 @@

Phishing Scam

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -13544,6 +13893,9 @@

Re-identification

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -21592,8 +21944,14 @@

Sabotage

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -21673,6 +22031,9 @@

Scam

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -21754,8 +22115,17 @@

Security Attack

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -21823,6 +22193,15 @@

Security Breach

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types + risk:IntegrityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -22365,10 +22744,16 @@

Spoofing

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept Broader/Parent types + risk:IntegrityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -22450,6 +22835,9 @@

System Failure

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -22534,8 +22922,17 @@

System Intrusion

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -22615,6 +23012,9 @@

System Malfunction

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -22933,8 +23333,17 @@

Unauthorised Access to Premises

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23014,8 +23423,17 @@

Unauthorised Activity

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23083,8 +23501,14 @@

Unauthorised Code Access

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23164,6 +23588,9 @@

Unauthorised Code Disclosure

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23247,6 +23674,9 @@

Unauthorised Code Modification

Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23326,6 +23756,9 @@

Unauthorised Data Access

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23407,6 +23840,9 @@

Unauthorised Data Disclosure

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23490,6 +23926,9 @@

Unauthorised Data Modification

Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23569,6 +24008,9 @@

Unauthorised Information Disclosure

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23650,6 +24092,9 @@

Unauthorised Re-Identification

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23728,6 +24173,9 @@

Unauthorised Resource Use

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23809,8 +24257,14 @@

Unauthorised System Access

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23892,6 +24346,9 @@

Unauthorised System Modification

Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23971,8 +24428,14 @@

Unwanted Code Deletion

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -24052,8 +24515,14 @@

Unwanted Data Deletion

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -24133,6 +24602,9 @@

Unwanted Disclosure of Data

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -25417,87 +25889,6 @@

Vulnerability

- - - -
-

Vulnerability Created

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
TermVulnerabilityCreatedPrefixrisk
LabelVulnerability Created
IRIhttps://w3id.org/dpv/risk#VulnerabilityCreated
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:InternalSecurityThreat - → dpv:RiskConcept -
DefinitionSomething that acts as or causes Vulnerability Created
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK -
-
@@ -25630,8 +26021,6 @@

Properties

- - @@ -26435,9 +26824,6 @@

has vulnerability

- - - @@ -27237,9 +27623,6 @@

refers to risk

- - - @@ -27334,8 +27717,6 @@

External

- - @@ -27637,9 +28018,6 @@

External

- - - @@ -28223,9 +28601,6 @@

External

- - -
diff --git a/2.1-dev/risk/index.html b/2.1-dev/risk/index.html index c8b42bf5f..4efbea699 100644 --- a/2.1-dev/risk/index.html +++ b/2.1-dev/risk/index.html @@ -1271,92 +1271,77 @@

Consequences and Impacts

dpv:hasImpact risk:RightsImpact . -

The risk concepts taxonomy is broadly divided into the following categories:

+

The concepts taxonomy is broadly divided into the following categories:

-
-

InternalSecurityThreat

-
@@ -2128,8 +2364,6 @@

Classes

- - @@ -3007,6 +3241,12 @@

Authorisation Failure

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types + risk:IntegrityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -3088,6 +3328,33 @@

None

Broader/Parent types + risk:DataBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:IntegrityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:IntegrityConcept + + Broader/Parent types risk:DataBreachrisk:SecurityBreachrisk:OperationalSecurityRisk @@ -3392,6 +3659,9 @@

Blackmail

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -3473,8 +3743,14 @@

Brute Force Authorisations

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -3724,6 +4000,9 @@

Coercion

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -3883,6 +4162,9 @@

Component Failure

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -3955,6 +4237,9 @@

Component Malfunction

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -4027,6 +4312,15 @@

Compromise Account

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types + risk:IntegrityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -4108,6 +4402,9 @@

Compromise Account Credentials

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -4189,6 +4486,33 @@

Confidentiality Breach

Broader/Parent types + risk:DataBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:IntegrityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:IntegrityConcept + + Broader/Parent types risk:DataBreachrisk:SecurityBreachrisk:OperationalSecurityRisk @@ -4666,6 +4990,9 @@

Cryptojacking

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -4825,6 +5152,18 @@

Data Breach

Broader/Parent types + risk:SecurityBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:SecurityBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:SecurityBreach + → risk:IntegrityConcept + + Broader/Parent types risk:SecurityBreachrisk:OperationalSecurityRiskdpv:RiskConcept @@ -4910,6 +5249,9 @@

Data Corruption

Broader/Parent types + risk:IntegrityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -5069,6 +5411,9 @@

Denial of Service Attack (DoS)

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -5092,7 +5437,7 @@

Denial of Service Attack (DoS)

Source - ISO/IEC 27005:2018, ISO/IEC 27005:2018 + ISO/IEC 27005:2018 @@ -5385,6 +5730,9 @@

Distributed Denial of Service Attack (DDoS)

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -5609,6 +5957,9 @@

Equipment Failure

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -5693,6 +6044,9 @@

Equipment Malfunction

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -6012,6 +6366,9 @@

Extorsion

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -6815,6 +7172,9 @@

Fraud

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -7499,6 +7859,9 @@

Identity Fraud

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -7580,6 +7943,9 @@

Identity Theft

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -7862,7 +8228,7 @@

Incident

Date Created - 2024-02-14 + 2024-05-19 Date Modified @@ -9873,6 +10239,33 @@

None

Broader/Parent types + risk:DataBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:IntegrityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:IntegrityConcept + + Broader/Parent types risk:DataBreachrisk:SecurityBreachrisk:OperationalSecurityRisk @@ -10085,6 +10478,9 @@

Intercept Communications

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -10141,74 +10537,6 @@

Intercept Communications

-
-

Internal Security Threat

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
TermInternalSecurityThreatPrefixrisk
LabelInternal Security Threat
IRIhttps://w3id.org/dpv/risk#InternalSecurityThreat
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types dpv:RiskConcept -
DefinitionConcepts associated with security threats and issues that originate within the organisation
See More: section RISK-CONSEQUENCES in RISK -
-
- - - @@ -11284,8 +11612,17 @@

Malicious Code Attack

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -11365,8 +11702,17 @@

Malware Attack

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -12766,6 +13112,9 @@

Phishing Scam

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -13544,6 +13893,9 @@

Re-identification

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -21592,8 +21944,14 @@

Sabotage

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -21673,6 +22031,9 @@

Scam

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -21754,8 +22115,17 @@

Security Attack

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -21823,6 +22193,15 @@

Security Breach

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types + risk:IntegrityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -22365,10 +22744,16 @@

Spoofing

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept Broader/Parent types + risk:IntegrityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -22450,6 +22835,9 @@

System Failure

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -22534,8 +22922,17 @@

System Intrusion

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -22615,6 +23012,9 @@

System Malfunction

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -22933,8 +23333,17 @@

Unauthorised Access to Premises

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23014,8 +23423,17 @@

Unauthorised Activity

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23083,8 +23501,14 @@

Unauthorised Code Access

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23164,6 +23588,9 @@

Unauthorised Code Disclosure

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23247,6 +23674,9 @@

Unauthorised Code Modification

Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23326,6 +23756,9 @@

Unauthorised Data Access

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23407,6 +23840,9 @@

Unauthorised Data Disclosure

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23490,6 +23926,9 @@

Unauthorised Data Modification

Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23569,6 +24008,9 @@

Unauthorised Information Disclosure

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23650,6 +24092,9 @@

Unauthorised Re-Identification

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23728,6 +24173,9 @@

Unauthorised Resource Use

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23809,8 +24257,14 @@

Unauthorised System Access

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23892,6 +24346,9 @@

Unauthorised System Modification

Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23971,8 +24428,14 @@

Unwanted Code Deletion

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -24052,8 +24515,14 @@

Unwanted Data Deletion

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -24133,6 +24602,9 @@

Unwanted Disclosure of Data

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -25417,87 +25889,6 @@

Vulnerability

- - - -
-

Vulnerability Created

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
TermVulnerabilityCreatedPrefixrisk
LabelVulnerability Created
IRIhttps://w3id.org/dpv/risk#VulnerabilityCreated
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:InternalSecurityThreat - → dpv:RiskConcept -
DefinitionSomething that acts as or causes Vulnerability Created
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK -
-
@@ -25630,8 +26021,6 @@

Properties

- - @@ -26435,9 +26824,6 @@

has vulnerability

- - - @@ -27237,9 +27623,6 @@

refers to risk

- - - @@ -27334,8 +27717,6 @@

External

- - @@ -27637,9 +28018,6 @@

External

- - - @@ -28223,9 +28601,6 @@

External

- - -
diff --git a/2.1-dev/risk/modules/risk_consequences-owl.jsonld b/2.1-dev/risk/modules/risk_consequences-owl.jsonld index e261bb3b6..eb1314cd5 100644 --- a/2.1-dev/risk/modules/risk_consequences-owl.jsonld +++ b/2.1-dev/risk/modules/risk_consequences-owl.jsonld @@ -1,9 +1,9 @@ [ { - "@id": "https://w3id.org/dpv/risk/owl#IdentityFraud", + "@id": "https://w3id.org/dpv/risk/owl#PhishingScam", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -25,7 +25,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nbc1a7f7ae94c4fde84913e9622b759f6" + "@id": "_:Nb657a11b610f419a86eb9ea4a94e7e37" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -35,7 +35,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -47,34 +50,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Identity Fraud" + "@value": "Something that acts as or causes Phishing Scam" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identity Fraud" + "@value": "Phishing Scam" } ] }, { - "@id": "_:Nbc1a7f7ae94c4fde84913e9622b759f6", + "@id": "_:Nb657a11b610f419a86eb9ea4a94e7e37", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseNegotiatingCapacity", + "@id": "https://w3id.org/dpv/risk/owl#Coercion", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -99,7 +102,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd8a232e440f041b496b97da8007b588a" + "@id": "_:Nc78302d156fb497aae9594fa63bb9fa7" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -109,7 +112,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -121,37 +127,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Negotiating Capacity" + "@value": "Something that acts as or causes Coercion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Negotiating Capacity" + "@value": "Coercion" } ] }, { - "@id": "_:Nd8a232e440f041b496b97da8007b588a", + "@id": "_:Nc78302d156fb497aae9594fa63bb9fa7", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk", + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -173,45 +179,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that arise during operational processes" + "@value": "Concepts associated with security threats that are likely to originate externally" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Operational Security Risk" + "@value": "External Security Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedAccesstoPremises", + "@id": "https://w3id.org/dpv/risk/owl#EnvironmentalRisk", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N2b8ae4e96b21406bb91bfdec8f460776" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -219,7 +203,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -231,286 +215,266 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Access to Premises" + "@value": "Risks and issues that have their origin in environment or can affect the environment at large" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Access to Premises" + "@value": "Environmental Risk" } ] }, { - "@id": "_:N2b8ae4e96b21406bb91bfdec8f460776", + "@id": "https://w3id.org/dpv/risk/owl#", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/ns/dx/prof/Profile", + "http://www.w3.org/2002/07/owl#Ontology" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/bibliographicCitation": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "http://www.w3.org/2004/02/skos/core" + }, + { + "@id": "http://www.w3.org/2002/07/owl" + }, + { + "@value": "http://www.w3.org/2000/01/rdf-schema" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedResourceUse", - "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ + { + "@value": "Julian Flake" + }, + { + "@value": "Fajar Ekaputra" + }, { "@value": "Harshvardhan J. Pandit" + }, + { + "@value": "Beatriz Esteves" + }, + { + "@value": "Axel Polleres" + }, + { + "@value": "Georg P. Krog" + }, + { + "@value": "Delaram Golpayegani" } ], "http://purl.org/dc/terms/created": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@language": "en", + "@value": "2022-08-14" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/creator": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "@language": "en", + "@value": "Paul Ryan" + }, { - "@id": "_:Nd4175f97fd33423f9014c3d690d56fad" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "@language": "en", + "@value": "Georg P. Krog" + }, { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "@language": "en", + "@value": "Delaram Golpayegani" + }, { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "@language": "en", + "@value": "Harshvardhan J. Pandit" + }, { "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "@value": "Beatriz Esteves" + }, { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Resource Use" + "@value": "Rob Brennan" + }, + { + "@language": "en", + "@value": "Julian Flake" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/description": [ { "@language": "en", - "@value": "Unauthorised Resource Use" + "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" } - ] - }, - { - "@id": "_:Nd4175f97fd33423f9014c3d690d56fad", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/hasVersion": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/identifier": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://w3id.org/dpv/risk" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#DataCorruption", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/issued": [ { - "@value": "Harshvardhan J. Pandit" + "@language": "en", + "@value": "2022-08-14" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/license": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://www.w3.org/copyright/document-license-2023/" } ], "http://purl.org/dc/terms/modified": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@language": "en", + "@value": "2024-07-13" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/publisher": [ { - "@id": "_:Ncd7b81f0daef4263a47284ebb48b83f6" + "@id": "https://www.w3.org/" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://www.w3.org/groups/cg/dpvcg/" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/title": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@language": "en", + "@value": "Risk Concepts" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/ontology/bibo/doi": [ { - "@language": "en", - "@value": "modified" + "@value": "10.5281/zenodo.12505841" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/ontology/bibo/status": [ { - "@language": "en", - "@value": "Something that acts as or causes Corruption of Data" + "@value": "http://purl.org/ontology/bibo/status/published" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/vocab/vann/preferredNamespacePrefix": [ { - "@language": "en", - "@value": "Data Corruption" + "@value": "risk" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "http://purl.org/vocab/vann/preferredNamespaceUri": [ { - "@language": "en", - "@value": "This concept was called \"Corruption Data\" in DPV 2.0" + "@value": "https://w3id.org/dpv/risk#" } - ] - }, - { - "@id": "_:Ncd7b81f0daef4263a47284ebb48b83f6", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#Label": [ { - "@value": "ISO/IEC 27005:2018" + "@language": "en", + "@value": "RISK" } ], - "https://schema.org/url": [ + "http://www.w3.org/2002/07/owl#versionIRI": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/2.1-dev/risk/owl#" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#Fee", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2002/07/owl#versionInfo": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "2.1-dev" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/ns/dx/prof/hasResource": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" - } - ], - "http://purl.org/dc/terms/modified": [ + "@id": "https://w3id.org/dpv/examples" + }, { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld" + }, { - "@language": "en", - "@value": "DGA 2.10" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "@id": "https://w3id.org/dpv/primer" + }, { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "@id": "https://w3id.org/dpv/guides" + }, { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-html" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/ns/dx/prof/isProfileOf": [ { - "@language": "en", - "@value": "modified" + "@id": "http://www.w3.org/2002/07/owl" + }, + { + "@id": "https://w3id.org/dpv/owl" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://xmlns.com/foaf/0.1/logo": [ { - "@language": "en", - "@value": "Something that acts as or provides fees e.g. for using a service" + "@id": "https://w3id.org/dpv/media/logo.png" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/version": [ { - "@language": "en", - "@value": "Fee" + "@value": "2.1-dev" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://www.w3.org/TR/json-ld11/" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://www.iana.org/assignments/media-types/application/ld+json" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "accepted" + "@value": "Risk Concepts - JSON-LD serialiation" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "Concepts associated with security threats that are likely to originate externally" + "@id": "https://w3id.org/dpv/risk/risk-owl.jsonld" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "External Security Threat" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PhishingScam", + "@id": "https://w3id.org/dpv/risk/owl#LoseOpportunity", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -532,7 +496,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N2039355de6a7474a8ab35355297e33c6" + "@id": "_:N2ea871931e3746e4aff469f67008e44f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -542,7 +506,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -554,34 +518,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Phishing Scam" + "@value": "Something that acts as or causes Loss of Opportunity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Phishing Scam" + "@value": "Lose of Opportunity" } ] }, { - "@id": "_:N2039355de6a7474a8ab35355297e33c6", + "@id": "_:N2ea871931e3746e4aff469f67008e44f", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RightsExercisePrevention", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingLegalObligation", "@type": [ "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -589,13 +553,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -604,6 +568,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N0b5dd4cc254540f49140434e86708abb" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -611,39 +580,86 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Prevent Exercising of Rights" + "@value": "Something that acts as or causes Violation of Legal Obligations" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Prevent Exercising of Rights" + "@value": "Violation of Legal Obligations" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0" + "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnwantedDataDeletion", + "@id": "_:N0b5dd4cc254540f49140434e86708abb", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/examples", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Examples for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/examples" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Terrorism", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -665,7 +681,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N7ff2bed0d152400e90aff3c52f1320b0" + "@id": "_:N84e706a33b7c462194d2c8fb5c04326c" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -675,7 +691,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -687,18 +703,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Data Deletion" + "@value": "Something that acts as or causes Terrorism" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Data Deletion" + "@value": "Terrorism" } ] }, { - "@id": "_:N7ff2bed0d152400e90aff3c52f1320b0", + "@id": "_:N84e706a33b7c462194d2c8fb5c04326c", "@type": [ "https://schema.org/WebPage" ], @@ -714,10 +730,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Sabotage", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeDisclosure", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -739,7 +755,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nddcd9454cd3f48779b8299743d6f1150" + "@id": "_:Nc4c391b305be479eb0e623d887a478ac" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -750,6 +766,9 @@ "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -761,37 +780,67 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Sabotage" + "@value": "Something that acts as or causes Unauthorised Code Disclosure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sabotage" + "@value": "Unauthorised Code Disclosure" } ] }, { - "@id": "_:Nddcd9454cd3f48779b8299743d6f1150", + "@id": "_:Nc4c391b305be479eb0e623d887a478ac", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SystemFailure", + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Risks and issues that affect or have the potential to affect specific individuals" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Individual Risk" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#MaterialDamage", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -802,7 +851,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-30" } ], "http://purl.org/dc/terms/modified": [ @@ -811,11 +860,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Ndb0e0e85d6ad4dabbf9efc7a0f2cb59a" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -823,7 +867,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -835,54 +879,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Failure" + "@value": "Something that acts as or causes Material Damage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Failure" + "@value": "Material Damage" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Here system refers to both hardware and software systems" + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" } ] }, { - "@id": "_:Ndb0e0e85d6ad4dabbf9efc7a0f2cb59a", + "@id": "https://w3id.org/dpv/risk/owl#DistributedDenialServiceAttack", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#LoseOpportunity", - "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -893,7 +921,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0e6dade5a2814d0f815e1c5dd41f1c65" + "@id": "_:N64ebcf10636d495599fc0fd262e44103" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -903,7 +931,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -915,18 +946,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Opportunity" + "@value": "Something that acts as or causes Distributed Denial of Service Attack (DDoS)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Opportunity" + "@value": "Distributed Denial of Service Attack (DDoS)" } ] }, { - "@id": "_:N0e6dade5a2814d0f815e1c5dd41f1c65", + "@id": "_:N64ebcf10636d495599fc0fd262e44103", "@type": [ "https://schema.org/WebPage" ], @@ -942,12 +973,34 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IndividualHealthSafety", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingEthicsCode", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N5971f1bb7e3149b49a4335be11b0926f" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -955,89 +1008,100 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Individual Health & Safety" - } - ] - }, - { - "@id": "https://w3id.org/dpv/examples", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" + "@value": "Something that acts as or causes Violation of Ethics Code" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@language": "en", + "@value": "Violating Ethics Code" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "Examples for Data Privacy Vocabulary" + "@language": "en", + "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0" } + ] + }, + { + "@id": "_:N5971f1bb7e3149b49a4335be11b0926f", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/examples" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "https://schema.org/url": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld", + "@id": "https://w3id.org/dpv/risk/owl#ComponentMalfunction", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.w3.org/TR/json-ld11/" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://www.iana.org/assignments/media-types/application/ld+json" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "Risk Concepts - JSON-LD serialiation" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.jsonld" + "@language": "en", + "@value": "Something that acts as or causes Component Malfunction" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@language": "en", + "@value": "Component Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#BruteForceAuthorisations", + "@id": "https://w3id.org/dpv/risk/owl#Damage", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1048,7 +1112,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-30" } ], "http://purl.org/dc/terms/modified": [ @@ -1057,11 +1121,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Ned6a23a4f6894305bc5d07abc6872b8e" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -1069,7 +1128,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1081,37 +1140,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques" + "@value": "Something that acts as or causes Damage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Brute Force Authorisations" - } - ] - }, - { - "@id": "_:Ned6a23a4f6894305bc5d07abc6872b8e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Damage" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SystemMalfunction", + "@id": "https://w3id.org/dpv/risk/owl#SexualViolence", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1133,7 +1176,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N1c2325e64024454ebc2e79f9e388cf3b" + "@id": "_:Ncb4b4f28b9894b79bfd2a5d2dd41f88f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1143,7 +1186,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1155,40 +1198,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Malfunction" + "@value": "Something that acts as or causes Sexual Violence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Malfunction" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here system refers to both hardware and software systems" + "@value": "Sexual Violence" } ] }, { - "@id": "_:N1c2325e64024454ebc2e79f9e388cf3b", + "@id": "_:Ncb4b4f28b9894b79bfd2a5d2dd41f88f", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedInformationDisclosure", + "@id": "https://w3id.org/dpv/risk/owl#LoseGoodwill", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -1213,7 +1250,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb2d6659136cf4d2fa881ae5798bf0e58" + "@id": "_:N194bc10f01ef4bdb99f12487816e6826" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1223,7 +1260,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1235,69 +1272,39 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Information Disclosure" + "@value": "Something that acts as or causes Loss of Goodwill" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Information Disclosure" + "@value": "Lose of Goodwill" } ] }, { - "@id": "_:Nb2d6659136cf4d2fa881ae5798bf0e58", + "@id": "_:N194bc10f01ef4bdb99f12487816e6826", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SocietalHealthSafety", + "@id": "https://w3id.org/dpv/risk/owl#DataCorruption", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Societal Health & Safety" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#EquipmentFailure", - "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], "http://purl.org/dc/terms/contributor": [ { "@value": "Harshvardhan J. Pandit" @@ -1317,7 +1324,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nc281053cb7ff4095b5eef42624c4ff46" + "@id": "_:N8aaec0d1fefb4744abcf3099509b1988" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1326,6 +1333,9 @@ } ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, { "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } @@ -1333,30 +1343,30 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Equipment Failure" + "@value": "Something that acts as or causes Corruption of Data" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Equipment Failure" + "@value": "Data Corruption" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Here equipment refers to physical equipment" + "@value": "This concept was called \"Corruption Data\" in DPV 2.0" } ] }, { - "@id": "_:Nc281053cb7ff4095b5eef42624c4ff46", + "@id": "_:N8aaec0d1fefb4744abcf3099509b1988", "@type": [ "https://schema.org/WebPage" ], @@ -1372,10 +1382,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Injury", + "@id": "https://w3id.org/dpv/risk/owl#PersonalSafetyEndangerment", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1397,7 +1407,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N1ef56bb9fadb431ba4c270603c7acdec" + "@id": "_:Na783f8da28594e8794173492db9ecac9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1407,7 +1417,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1419,18 +1429,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Injury" + "@value": "Something that acts as or causes Personal Safety Endangerment" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Injury" + "@value": "Personal Safety Endangerment" } ] }, { - "@id": "_:N1ef56bb9fadb431ba4c270603c7acdec", + "@id": "_:Na783f8da28594e8794173492db9ecac9", "@type": [ "https://schema.org/WebPage" ], @@ -1446,7 +1456,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Blackmail", + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityBreach", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -1471,7 +1481,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N3ef9f5a9eb554279905f69c263712205" + "@id": "_:N0571680fc6554da2a384a2e851d510c0" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1481,7 +1491,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#DataBreach" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1493,18 +1506,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Blackmail" + "@value": "Something that acts as or causes Confidentiality Breach" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Blackmail" + "@value": "Confidentiality Breach" } ] }, { - "@id": "_:N3ef9f5a9eb554279905f69c263712205", + "@id": "_:N0571680fc6554da2a384a2e851d510c0", "@type": [ "https://schema.org/WebPage" ], @@ -1520,21 +1533,21 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ErroneousSystemUse", + "@id": "https://w3id.org/dpv/risk/owl#Misuse", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Delaram Golpayegani" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-06-11" } ], "http://purl.org/dc/terms/modified": [ @@ -1543,11 +1556,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Ne874eff2b0f74da79392c36cf77d71f1" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -1567,37 +1575,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Erroneous System Use" + "@value": "Something that acts as or causes Misuse" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Erroneous System Use" - } - ] - }, - { - "@id": "_:Ne874eff2b0f74da79392c36cf77d71f1", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityBreach", + "@id": "https://w3id.org/dpv/risk/owl#EquipmentMalfunction", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1619,7 +1611,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N804ad242900c474395dd117c74dace8e" + "@id": "_:N53bfad5db8324151841ce01472d06f41" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1629,7 +1621,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#DataBreach" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1641,18 +1636,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Confidentiality Breach" + "@value": "Something that acts as or causes Equipment Malfunction" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confidentiality Breach" + "@value": "Equipment Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here equipment refers to physical equipment" } ] }, { - "@id": "_:N804ad242900c474395dd117c74dace8e", + "@id": "_:N53bfad5db8324151841ce01472d06f41", "@type": [ "https://schema.org/WebPage" ], @@ -1668,7 +1669,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemAccess", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingStatutoryObligations", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -1693,7 +1694,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N4387faf4bb854435bfdc47ebf666782a" + "@id": "_:Ne3511d0b904a403e93b1538888ad1023" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1703,30 +1704,36 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised System Access" + "@value": "Something that acts as or causes Violation of Statutory Obligations" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised System Access" + "@value": "Violation of Statutory Obligations" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0" } ] }, { - "@id": "_:N4387faf4bb854435bfdc47ebf666782a", + "@id": "_:Ne3511d0b904a403e93b1538888ad1023", "@type": [ "https://schema.org/WebPage" ], @@ -1742,41 +1749,33 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingContractualObligation", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "accepted" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "Risks and issues that affect or have the potential to affect specific individuals" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "Individual Risk" + "@id": "_:N638499f1a35f4f94abab8a1e6e4bf97d" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IntentionalMisuse", - "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -1785,44 +1784,66 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Intentional Misuse" + "@value": "Something that acts as or causes Violation of Contractual Obligations" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Intentional Misuse" + "@value": "Violation of Contractual Obligation" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RightsLimitation", + "@id": "_:N638499f1a35f4f94abab8a1e6e4bf97d", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Harm", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-13" } ], "http://purl.org/dc/terms/modified": [ @@ -1838,7 +1859,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1850,24 +1871,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Limitation of Rights" + "@value": "Something that acts as or causes Harm to humans" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Limitation of Rights" + "@value": "Harm" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0" + "@value": "This concept refers to the general abstract notion of harm" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DataBreach", + "@id": "https://w3id.org/dpv/risk/owl#IllegalDataProcessing", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -1892,15 +1913,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N82834c9f1ecf4644ab2d9343a1169c62" - } - ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples/owl#E0071" - }, - { - "@id": "https://w3id.org/dpv/examples/owl#E0069" + "@id": "_:Nfbea264abf694083a7d1db8b2101092b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1910,7 +1923,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1922,18 +1935,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Data Breach" + "@value": "Something that acts as or causes Illegal Processing of Data" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Breach" + "@value": "Illegal Data Processing" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0" } ] }, { - "@id": "_:N82834c9f1ecf4644ab2d9343a1169c62", + "@id": "_:Nfbea264abf694083a7d1db8b2101092b", "@type": [ "https://schema.org/WebPage" ], @@ -1949,7 +1968,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PublicOrderBreach", + "@id": "https://w3id.org/dpv/risk/owl#RightsViolation", "@type": [ "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1957,13 +1976,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://purl.org/dc/terms/modified": [ @@ -1972,11 +1991,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N2bd2812bbacb46319d2bdb0e95e02f65" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -1984,7 +1998,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1996,60 +2010,72 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Public Order Breach" + "@value": "Something that acts as or causes Violation of Rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Public Order Breach" + "@value": "Violation of Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0" } ] }, { - "@id": "_:N2bd2812bbacb46319d2bdb0e95e02f65", + "@id": "https://w3id.org/dpv/risk/owl#Discrimination", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Georg P. Krog" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-19" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://www.w3.org/TR/turtle/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.iana.org/assignments/media-types/text/turtle" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "Risk Concepts - Turtle serialiation" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.ttl" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@language": "en", + "@value": "Something that acts as or causes Discrimination" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Discrimination" } ] }, @@ -2085,12 +2111,34 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#JudicialPenalty", + "@id": "https://w3id.org/dpv/risk/owl#LoseTrust", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N95b0eaaa71714fb48e2d00a428e03220" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -2098,7 +2146,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2110,23 +2158,61 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that involves or causes judicial penalties to be paid" + "@value": "Something that acts as or causes Loss of Trust" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Judicial Penalty" + "@value": "Lose of Trust" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ComponentMalfunction", + "@id": "_:N95b0eaaa71714fb48e2d00a428e03220", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IdentityTheft", "@type": [ "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N33b7660d50a4461e927089957dfd848b" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -2135,6 +2221,9 @@ "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2146,58 +2235,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Component Malfunction" + "@value": "Something that acts as or causes Identity Theft" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Component Malfunction" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of" + "@value": "Identity Theft" } ] }, { - "@id": "https://w3id.org/dpv/guides", + "@id": "_:N33b7660d50a4461e927089957dfd848b", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Guides for Data Privacy Vocabulary" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/guides" + "@value": "ENISA Threat Taxonomy 2016" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "https://schema.org/url": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnwantedDisclosureData", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedAccesstoPremises", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2219,7 +2287,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N12b2c9394da44250a5ab771adc23fab8" + "@id": "_:N7487c570f8f54358874e08fa38c8f27d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2228,8 +2296,17 @@ } ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, { "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2241,18 +2318,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Disclosure of Data" + "@value": "Something that acts as or causes Unauthorised Access to Premises" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Disclosure of Data" + "@value": "Unauthorised Access to Premises" } ] }, { - "@id": "_:N12b2c9394da44250a5ab771adc23fab8", + "@id": "_:N7487c570f8f54358874e08fa38c8f27d", "@type": [ "https://schema.org/WebPage" ], @@ -2268,10 +2345,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingStatutoryObligations", + "@id": "https://w3id.org/dpv/risk/owl#UnwantedDisclosureData", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2293,7 +2370,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb5000792f7ae42ffb4c7efe3b93be7df" + "@id": "_:Nf14815c8a8694940bcdb35d12bf37b11" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2303,36 +2380,33 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Statutory Obligations" + "@value": "Something that acts as or causes Unwanted Disclosure of Data" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Statutory Obligations" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0" + "@value": "Unwanted Disclosure of Data" } ] }, { - "@id": "_:Nb5000792f7ae42ffb4c7efe3b93be7df", + "@id": "_:Nf14815c8a8694940bcdb35d12bf37b11", "@type": [ "https://schema.org/WebPage" ], @@ -2348,12 +2422,34 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Privacy", + "@id": "https://w3id.org/dpv/risk/owl#LoseReputation", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N90d89ca8a8594ecabee31205aee25395" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -2361,7 +2457,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2370,44 +2466,65 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Loss of Reputation" + } + ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Privacy" + "@value": "Lose of Reputation" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityBreach", + "@id": "_:N90d89ca8a8594ecabee31205aee25395", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk/owl#DataBreach" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "accepted" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact", + "@id": "https://w3id.org/dpv/risk/owl#Fee", "@type": [ "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-04-14" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "DGA 2.10" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -2415,30 +2532,30 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Things that cause or have the potential to impact financial resources" + "@value": "Something that acts as or provides fees e.g. for using a service" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Impact" + "@value": "Fee" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Coercion", + "@id": "https://w3id.org/dpv/risk/owl#SystemIntrusion", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -2463,7 +2580,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N61513676426149faae9e58063eb667d8" + "@id": "_:Ne8bd9725515e46d0a941f4a4665a7868" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2472,8 +2589,17 @@ } ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, { "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2485,39 +2611,61 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Coercion" + "@value": "Something that acts as or causes System Intrusion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Coercion" + "@value": "System Intrusion" } ] }, { - "@id": "_:N61513676426149faae9e58063eb667d8", + "@id": "_:Ne8bd9725515e46d0a941f4a4665a7868", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#JudicialCosts", + "@id": "https://w3id.org/dpv/risk/owl#Extorsion", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N78e6085a5a4a4a08adbcdb4af46722d9" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -2525,7 +2673,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2537,39 +2688,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that involves or causes judicial costs to be paid" + "@value": "Something that acts as or causes Extorsion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Judicial Costs" + "@value": "Extorsion" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Harm", + "@id": "_:N78e6085a5a4a4a08adbcdb4af46722d9", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ENISA Threat Taxonomy 2016" } ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-13" - } - ], - "http://purl.org/dc/terms/modified": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IndividualHealthSafety", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -2587,41 +2737,29 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Harm to humans" - } - ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Harm" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept refers to the general abstract notion of harm" + "@value": "Individual Health & Safety" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Renumeration", + "@id": "https://w3id.org/dpv/risk/owl#MalwareAttack", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -2630,6 +2768,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6fb9cc1510c4401a9c582949b7a8c8b7" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -2637,7 +2780,16 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2649,39 +2801,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides renumeration which is in monetary or financial form" + "@value": "Something that acts as or causes Malware Attack" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remuneration" + "@value": "Malware Attack" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Detriment", + "@id": "_:N6fb9cc1510c4401a9c582949b7a8c8b7", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" - } + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/name": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], - "http://purl.org/dc/terms/modified": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -2690,7 +2841,16 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2702,21 +2862,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Detriment" + "@value": "Something that acts as or causes an attack on security with the aim of undermining it" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Detriment" + "@value": "Security Attack" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity", + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2726,7 +2886,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2738,18 +2898,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Activity" + "@value": "Risks and issues that affect the reputation of the organisation" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Activity" + "@value": "Reputational Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SystemIntrusion", + "@id": "https://w3id.org/dpv/risk/owl#SocialDisadvantage", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -2757,13 +2917,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-19" } ], "http://purl.org/dc/terms/modified": [ @@ -2772,11 +2932,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N7a5848cbabb14c8ea2d162432eba32f0" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -2784,7 +2939,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2796,37 +2951,52 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Intrusion" + "@value": "Something that acts as or causes Social Disadvantage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Intrusion" + "@value": "Social Disadvantage" } ] }, { - "@id": "_:N7a5848cbabb14c8ea2d162432eba32f0", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/format": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - RDF/XML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.rdf" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedInformationDisclosure", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2848,7 +3018,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nee086e9da9f643e2837c115c27f1cabc" + "@id": "_:N89971235b5e34930a94f46c696e0ac94" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2858,7 +3028,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2870,34 +3043,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Security Breach" + "@value": "Something that acts as or causes Unauthorised Information Disclosure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Security Breach" + "@value": "Unauthorised Information Disclosure" } ] }, { - "@id": "_:Nee086e9da9f643e2837c115c27f1cabc", + "@id": "_:N89971235b5e34930a94f46c696e0ac94", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MalwareAttack", + "@id": "https://w3id.org/dpv/risk/owl#Reidentification", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -2911,7 +3084,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-19" } ], "http://purl.org/dc/terms/modified": [ @@ -2920,11 +3093,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N933b42794d4f41a39ee17bc9b20bf774" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -2932,7 +3100,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2944,48 +3115,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Malware Attack" + "@value": "Something that acts as or causes Re-identification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Malware Attack" - } - ] - }, - { - "@id": "_:N933b42794d4f41a39ee17bc9b20bf774", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "Re-identification" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@language": "en", + "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedReidentification", + "@id": "https://w3id.org/dpv/risk/owl#RightsImpact", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -2994,6 +3155,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N7b552ef83c274f84b167cc68c23676bb" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -3001,7 +3167,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/owl#Impact" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3013,18 +3182,40 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Re-Identification" + "@value": "Something that acts as or causes Impact to Rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Re-Identification" + "@value": "Impact to Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ImpactToRights\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CopyrightViolation", + "@id": "_:N7b552ef83c274f84b167cc68c23676bb", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataDisclosure", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -3049,7 +3240,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N73922ea12cd34584b91e209f306167ae" + "@id": "_:N7c66233cabb64c2486ae612a1ff6b01d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3059,7 +3250,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3071,37 +3265,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Copyright Violation" + "@value": "Something that acts as or causes Unauthorised Data Disclosure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Copyright Violation" + "@value": "Unauthorised Data Disclosure" } ] }, { - "@id": "_:N73922ea12cd34584b91e209f306167ae", + "@id": "_:N7c66233cabb64c2486ae612a1ff6b01d", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemModification", + "@id": "https://w3id.org/dpv/risk/owl#HumanErrors", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3123,7 +3317,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0c47798cd08a44d790a99ee3c58dcfb9" + "@id": "_:Na882c52257364f5896e5b38b50bb08fe" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3133,7 +3327,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3145,34 +3339,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised System Modification" + "@value": "Something that acts as or causes Human Errors" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised System Modification" + "@value": "Human Errors" } ] }, { - "@id": "_:N0c47798cd08a44d790a99ee3c58dcfb9", + "@id": "_:Na882c52257364f5896e5b38b50bb08fe", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MaliciousCodeAttack", + "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -3197,7 +3391,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N7beef942706b41468112e467b91c5f39" + "@id": "_:Nb3034bc7cf1e485b85582c21529ebaa4" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3207,7 +3401,16 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3219,34 +3422,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Malicious Code Attack" + "@value": "Something that acts as or causes Security Breach" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Malicious Code Attack" + "@value": "Security Breach" } ] }, { - "@id": "_:N7beef942706b41468112e467b91c5f39", + "@id": "_:Nb3034bc7cf1e485b85582c21529ebaa4", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Fraud", + "@id": "https://w3id.org/dpv/risk/owl#SystemMalfunction", "@type": [ "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3271,7 +3474,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd4dde0f0f01e4d739b22630aa8ad7d7a" + "@id": "_:N18aeaa08367a4c56822793249e34feae" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3281,7 +3484,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3293,18 +3499,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Fraud" + "@value": "Something that acts as or causes System Malfunction" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Fraud" + "@value": "System Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here system refers to both hardware and software systems" } ] }, { - "@id": "_:Nd4dde0f0f01e4d739b22630aa8ad7d7a", + "@id": "_:N18aeaa08367a4c56822793249e34feae", "@type": [ "https://schema.org/WebPage" ], @@ -3320,10 +3532,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Cryptojacking", + "@id": "https://w3id.org/dpv/risk/owl#AuthorisationFailure", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3345,7 +3557,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Neb960f38438d48258bee0ebae96be48e" + "@id": "_:N588812d3250243469d4d5b0cbd82dc9e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3355,7 +3567,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3367,37 +3585,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Cryptojacking" + "@value": "Something that acts as or causes Authorisation Failure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cryptojacking" + "@value": "Authorisation Failure" } ] }, { - "@id": "_:Neb960f38438d48258bee0ebae96be48e", + "@id": "_:N588812d3250243469d4d5b0cbd82dc9e", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Landscape 2021" + "@value": "ENISa Trust Services Security Incidents 2021" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" + "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataDisclosure", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingCodeOfConduct", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3419,7 +3637,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nf415d60c8c8849ba95e5611d481b06ce" + "@id": "_:Nb240be91051241df8fe71581eedea8cc" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3429,30 +3647,36 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Disclosure" + "@value": "Something that acts as or causes Violation of Code of Conduct" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Disclosure" + "@value": "Violating Code of Conduct" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0" } ] }, { - "@id": "_:Nf415d60c8c8849ba95e5611d481b06ce", + "@id": "_:Nb240be91051241df8fe71581eedea8cc", "@type": [ "https://schema.org/WebPage" ], @@ -3468,7 +3692,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AuthorisationFailure", + "@id": "https://w3id.org/dpv/risk/owl#Renumeration", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -3476,13 +3700,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], "http://purl.org/dc/terms/modified": [ @@ -3491,11 +3715,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N8906a1d2a7bd4484854e88a2dc1b93a5" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -3503,7 +3722,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3515,34 +3734,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Authorisation Failure" + "@value": "Something that acts as or provides renumeration which is in monetary or financial form" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Authorisation Failure" - } - ] - }, - { - "@id": "_:N8906a1d2a7bd4484854e88a2dc1b93a5", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISa Trust Services Security Incidents 2021" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" + "@value": "Remuneration" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Scam", + "@id": "https://w3id.org/dpv/risk/owl#FinancialLoss", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -3567,7 +3770,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N498890541a5449e290f0aea406ea5090" + "@id": "_:N698d6b9272804e2dba685b14f6e69152" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3577,7 +3780,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3589,18 +3792,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Scam" + "@value": "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Scam" + "@value": "Financial Loss" } ] }, { - "@id": "_:N498890541a5449e290f0aea406ea5090", + "@id": "_:N698d6b9272804e2dba685b14f6e69152", "@type": [ "https://schema.org/WebPage" ], @@ -3616,10 +3819,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Extorsion", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedResourceUse", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3641,7 +3844,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N40f94dff19814aa6ae7d3074eb3409d8" + "@id": "_:N605e2cac18a74200ab14cc33e319b6cb" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3652,6 +3855,9 @@ "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3663,60 +3869,99 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Extorsion" + "@value": "Something that acts as or causes Unauthorised Resource Use" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extorsion" + "@value": "Unauthorised Resource Use" } ] }, { - "@id": "_:N40f94dff19814aa6ae7d3074eb3409d8", + "@id": "_:N605e2cac18a74200ab14cc33e319b6cb", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PhysicalAssault", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/turtle/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/turtle" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - Turtle serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.ttl" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SocietalHealthSafety", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "_:N4414613afa8c4456b9a9b6c3f17a7a0c" + "@language": "en", + "@value": "Societal Health & Safety" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AccidentalMisuse", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -3725,7 +3970,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3737,37 +3982,57 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Physical Assault" + "@value": "Accidental Misuse" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Physical Assault" + "@value": "Accidental Misuse" } ] }, { - "@id": "_:N4414613afa8c4456b9a9b6c3f17a7a0c", + "@id": "https://w3id.org/dpv/risk/owl#JudicialCosts", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that involves or causes judicial costs to be paid" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Judicial Costs" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#HumanErrors", + "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccount", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3789,7 +4054,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N7d9296887d1d4b6ea986d2ad6579a1ec" + "@id": "_:N252928e4ed0f4c6ea83876f7fb2c3d78" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3799,7 +4064,16 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3811,18 +4085,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Human Errors" + "@value": "Something that acts as or causes a compromised account that is then used by the compromiser" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Human Errors" + "@value": "Compromise Account" } ] }, { - "@id": "_:N7d9296887d1d4b6ea986d2ad6579a1ec", + "@id": "_:N252928e4ed0f4c6ea83876f7fb2c3d78", "@type": [ "https://schema.org/WebPage" ], @@ -3838,42 +4112,20 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IllegalDataProcessing", + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N83bd5296b4d94804a73f0e0518c39495" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3885,150 +4137,80 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Illegal Processing of Data" + "@value": "Things that cause or have the potential to impact financial resources" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Illegal Data Processing" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N83bd5296b4d94804a73f0e0518c39495", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Financial Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks", + "@id": "https://w3id.org/dpv/guides", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://www.w3.org/TR/html/" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "accepted" + "@value": "Guides for Data Privacy Vocabulary" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "Concepts associated with risks that arise due to User or Human use" + "@id": "https://w3id.org/dpv/guides" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "User Risks" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PsychologicalHarm", + "@id": "https://w3id.org/dpv/primer", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N903ec696d7504183af4ba63f3f295e8e" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" - } + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@language": "en", - "@value": "accepted" + "@id": "https://www.w3.org/TR/html/" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/format": [ { - "@language": "en", - "@value": "Something that acts as or causes Psychological Harm" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "Psychological Harm" + "@value": "Primer for Data Privacy Vocabulary" } - ] - }, - { - "@id": "_:N903ec696d7504183af4ba63f3f295e8e", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@id": "https://w3id.org/dpv/primer" } ], - "https://schema.org/url": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccount", + "@id": "https://w3id.org/dpv/risk/owl#Blackmail", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -4053,7 +4235,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N2ad682e6dc844471903bc2f55f3eaae7" + "@id": "_:N72e00e4999f548eb88bf909311860524" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4063,7 +4245,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4075,34 +4260,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes a compromised account that is then used by the compromiser" + "@value": "Something that acts as or causes Blackmail" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account" + "@value": "Blackmail" } ] }, { - "@id": "_:N2ad682e6dc844471903bc2f55f3eaae7", + "@id": "_:N72e00e4999f548eb88bf909311860524", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Payment", + "@id": "https://w3id.org/dpv/risk/owl#Benefit", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -4110,13 +4295,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-03-23" } ], "http://purl.org/dc/terms/modified": [ @@ -4144,49 +4329,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources" + "@value": "Something that acts as or causes benefits" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Payment" - } - ] - }, - { - "@id": "https://w3id.org/dpv/primer", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Primer for Data Privacy Vocabulary" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/primer" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@value": "Benefit" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccountCredentials", + "@id": "https://w3id.org/dpv/risk/owl#DenialServiceAttack", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -4211,7 +4365,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nf877665a169e4a7eac29964fc15db245" + "@id": "_:N8705162a41ca472c9e3867ec5902de25" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4221,7 +4375,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4233,56 +4390,39 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Account Credentials to be compromised" + "@value": "Something that acts as or causes Denial of Service Attack (DoS)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account Credentials" + "@value": "Denial of Service Attack (DoS)" } ] }, { - "@id": "_:Nf877665a169e4a7eac29964fc15db245", + "@id": "_:N8705162a41ca472c9e3867ec5902de25", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Damage", + "@id": "https://w3id.org/dpv/risk/owl#ComponentFailure", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -4290,7 +4430,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4302,13 +4445,19 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Damage" + "@value": "Something that acts as or causes Component Failure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Damage" + "@value": "Component Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of" } ] }, @@ -4349,243 +4498,95 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#", + "@id": "https://w3id.org/dpv/risk/owl#EquipmentFailure", "@type": [ - "http://www.w3.org/ns/dx/prof/Profile", - "http://www.w3.org/2002/07/owl#Ontology" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/bibliographicCitation": [ - { - "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" - } - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@value": "http://www.w3.org/2004/02/skos/core" - }, - { - "@id": "http://www.w3.org/2002/07/owl" - }, - { - "@value": "http://www.w3.org/2000/01/rdf-schema" - } - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Axel Polleres" - }, - { - "@value": "Julian Flake" - }, - { - "@value": "Fajar Ekaputra" - }, - { - "@value": "Beatriz Esteves" - }, - { - "@value": "Delaram Golpayegani" - }, - { - "@value": "Georg P. Krog" - }, + "http://purl.org/dc/terms/contributor": [ { "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "2022-08-14" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/creator": [ - { - "@language": "en", - "@value": "Delaram Golpayegani" - }, - { - "@language": "en", - "@value": "Beatriz Esteves" - }, - { - "@language": "en", - "@value": "Julian Flake" - }, - { - "@language": "en", - "@value": "Rob Brennan" - }, - { - "@language": "en", - "@value": "Harshvardhan J. Pandit" - }, - { - "@language": "en", - "@value": "Paul Ryan" - }, + "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "Georg P. Krog" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/description": [ + "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" + "@id": "_:N8e86fbf714a04b25a51dfcacec1cb10e" } ], - "http://purl.org/dc/terms/hasVersion": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/identifier": [ - { - "@value": "https://w3id.org/dpv/risk" - } - ], - "http://purl.org/dc/terms/issued": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@language": "en", - "@value": "2022-08-14" - } - ], - "http://purl.org/dc/terms/license": [ + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + }, { - "@id": "https://www.w3.org/copyright/document-license-2023/" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "2024-07-13" - } - ], - "http://purl.org/dc/terms/publisher": [ - { - "@id": "https://www.w3.org/" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "https://www.w3.org/groups/cg/dpvcg/" + "@value": "accepted" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Concepts" - } - ], - "http://purl.org/ontology/bibo/doi": [ - { - "@value": "10.5281/zenodo.12505841" - } - ], - "http://purl.org/ontology/bibo/status": [ - { - "@value": "http://purl.org/ontology/bibo/status/published" - } - ], - "http://purl.org/vocab/vann/preferredNamespacePrefix": [ - { - "@value": "risk" - } - ], - "http://purl.org/vocab/vann/preferredNamespaceUri": [ - { - "@value": "https://w3id.org/dpv/risk#" + "@value": "Something that acts as or causes Equipment Failure" } ], - "http://www.w3.org/2000/01/rdf-schema#Label": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "RISK" - } - ], - "http://www.w3.org/2002/07/owl#versionIRI": [ - { - "@id": "https://w3id.org/dpv/2.1-dev/risk/owl#" - } - ], - "http://www.w3.org/2002/07/owl#versionInfo": [ - { - "@value": "2.1-dev" - } - ], - "http://www.w3.org/ns/dx/prof/hasResource": [ - { - "@id": "https://w3id.org/dpv/guides" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-html" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3" - }, - { - "@id": "https://w3id.org/dpv/examples" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl" - }, - { - "@id": "https://w3id.org/dpv/primer" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf" + "@value": "Equipment Failure" } ], - "http://www.w3.org/ns/dx/prof/isProfileOf": [ - { - "@id": "http://www.w3.org/2002/07/owl" - }, - { - "@id": "https://w3id.org/dpv/owl" - }, + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@language": "en", + "@value": "Here equipment refers to physical equipment" } + ] + }, + { + "@id": "_:N8e86fbf714a04b25a51dfcacec1cb10e", + "@type": [ + "https://schema.org/WebPage" ], - "http://xmlns.com/foaf/0.1/logo": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/media/logo.png" + "@value": "ISO/IEC 27005:2018" } ], - "https://schema.org/version": [ + "https://schema.org/url": [ { - "@value": "2.1-dev" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Compensation", + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -4593,7 +4594,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4605,127 +4606,39 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms" + "@value": "Risks and issues that arise during operational processes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compensation" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-html", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - HTML serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk-owl.html" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/specification" + "@value": "Operational Security Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VulnerabilityCreated", + "@id": "https://w3id.org/dpv/risk/owl#RightsExercisePrevention", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://purl.org/dc/terms/modified": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nc0018c079b6b42619d869b3ae63ec70a" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#InternalSecurityThreat" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Vulnerability Created" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Vulnerability Created" - } - ] - }, - { - "@id": "_:Nc0018c079b6b42619d869b3ae63ec70a", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "2024-08-16" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ComponentFailure", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -4734,7 +4647,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4746,24 +4659,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Component Failure" + "@value": "Something that acts as or causes Prevent Exercising of Rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Component Failure" + "@value": "Prevent Exercising of Rights" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of" + "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IdentityTheft", + "@id": "https://w3id.org/dpv/risk/owl#Spoofing", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -4788,7 +4701,10 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nad476399871e41a5bd37e1133df27770" + "@id": "_:N0085b3ac0b474cf1a64eccdff3718c8d" + }, + { + "@id": "_:N539160303302464aa341bdfa53068f22" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4799,6 +4715,15 @@ "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4810,60 +4735,54 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Identity Theft" + "@value": "Something that acts as or causes Spoofing" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identity Theft" + "@value": "Spoofing" } ] }, { - "@id": "_:Nad476399871e41a5bd37e1133df27770", + "@id": "_:N0085b3ac0b474cf1a64eccdff3718c8d", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnwantedCodeDeletion", + "@id": "_:N539160303302464aa341bdfa53068f22", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/modified": [ + "https://schema.org/name": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/source": [ + "https://schema.org/url": [ { - "@id": "_:Nef681cfae64c43969ff8ef7fdde7753a" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -4872,7 +4791,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4884,34 +4803,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Code Deletion" + "@value": "Risks and issues that have their basis in legal requirements and enforcement" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Code Deletion" - } - ] - }, - { - "@id": "_:Nef681cfae64c43969ff8ef7fdde7753a", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "Legal Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingCodeOfConduct", + "@id": "https://w3id.org/dpv/risk/owl#Fraud", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -4936,7 +4839,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N3d2e8d97024142dca7a47b73cbb8097c" + "@id": "_:N0328e4baf7504ceb93cd9bbab8b23099" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4946,36 +4849,33 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Code of Conduct" + "@value": "Something that acts as or causes Fraud" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Code of Conduct" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0" + "@value": "Fraud" } ] }, { - "@id": "_:N3d2e8d97024142dca7a47b73cbb8097c", + "@id": "_:N0328e4baf7504ceb93cd9bbab8b23099", "@type": [ "https://schema.org/WebPage" ], @@ -4991,34 +4891,12 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseTrust", + "@id": "https://w3id.org/dpv/risk/owl#Privacy", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nbb93cef662444084828d04948d35895d" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -5026,7 +4904,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5035,37 +4913,15 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Loss of Trust" - } - ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Trust" - } - ] - }, - { - "@id": "_:Nbb93cef662444084828d04948d35895d", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Privacy" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#InterceptCommunications", + "@id": "https://w3id.org/dpv/risk/owl#Cryptojacking", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -5090,7 +4946,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N9ba04625c759479eba79e0016163e8e6" + "@id": "_:N3adf839933da482c89a2828fc9743969" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5099,6 +4955,9 @@ } ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, { "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } @@ -5106,73 +4965,45 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Interception of Communications" + "@value": "Something that acts as or causes Cryptojacking" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Intercept Communications" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0" + "@value": "Cryptojacking" } ] }, { - "@id": "_:N9ba04625c759479eba79e0016163e8e6", + "@id": "_:N3adf839933da482c89a2828fc9743969", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Landscape 2021" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingLegalObligation", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingPolicy", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Naf3bb0ebde894641a8c0a69545e7f6cc" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -5186,46 +5017,24 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Legal Obligations" + "@value": "Something that acts as or causes violation of policy which can be either internal or external policy" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Legal Obligations" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0" - } - ] - }, - { - "@id": "_:Naf3bb0ebde894641a8c0a69545e7f6cc", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Violating Policy" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SocialDisadvantage", + "@id": "https://w3id.org/dpv/risk/owl#LoseCustomerConfidence", "@type": [ "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -5233,13 +5042,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -5248,6 +5057,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N669b51dd9b0f4a71983f16dfc274956a" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -5255,7 +5069,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5267,21 +5081,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Social Disadvantage" + "@value": "Something that acts as or causes Loss of Customer Confidence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@language": "en", - "@value": "Social Disadvantage" + "@language": "en", + "@value": "Lose of Customer Confidence" + } + ] + }, + { + "@id": "_:N669b51dd9b0f4a71983f16dfc274956a", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingEthicsCode", + "@id": "https://w3id.org/dpv/risk/owl#PsychologicalHarm", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5303,7 +5133,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd8ddc1f8024a4418b62c344837cff0cd" + "@id": "_:N0ddf524630684b719d7f03f907c20cff" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5313,57 +5143,78 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Ethics Code" + "@value": "Something that acts as or causes Psychological Harm" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Ethics Code" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0" + "@value": "Psychological Harm" } ] }, { - "@id": "_:Nd8ddc1f8024a4418b62c344837cff0cd", + "@id": "_:N0ddf524630684b719d7f03f907c20cff", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseCustomerConfidence", + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityBreach", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#DataBreach" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeModification", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], "http://purl.org/dc/terms/contributor": [ { "@value": "Harshvardhan J. Pandit" @@ -5383,7 +5234,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0d138f94265e46f293490fbe0fc8074c" + "@id": "_:Ncecbd81981b3460f9cede6031d4ab8b1" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5393,7 +5244,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5405,37 +5259,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Customer Confidence" + "@value": "Something that acts as or causes Unauthorised Code Modification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Customer Confidence" + "@value": "Unauthorised Code Modification" } ] }, { - "@id": "_:N0d138f94265e46f293490fbe0fc8074c", + "@id": "_:Ncecbd81981b3460f9cede6031d4ab8b1", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RightsImpact", + "@id": "https://w3id.org/dpv/risk/owl#ViolenceAgainstChildren", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5457,7 +5311,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N4e0b95db2d414e7588f607d2edf6902e" + "@id": "_:N50def33314ee4442bf7e77161e51165b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5467,10 +5321,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Impact" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5482,40 +5333,40 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Impact to Rights" + "@value": "Something that acts as or causes Child Violence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Impact to Rights" + "@value": "Violence against children" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"ImpactToRights\" in DPV 2.0" + "@value": "This concept was called \"ChildViolence\" in DPV 2.0" } ] }, { - "@id": "_:N4e0b95db2d414e7588f607d2edf6902e", + "@id": "_:N50def33314ee4442bf7e77161e51165b", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeAccess", + "@id": "https://w3id.org/dpv/risk/owl#UnwantedCodeDeletion", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -5540,7 +5391,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N8193907d23bd43dc8b146573989b8a0d" + "@id": "_:N9b03e23aa8864f4288a1885778e3b1e4" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5551,6 +5402,12 @@ "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5562,18 +5419,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Access" + "@value": "Something that acts as or causes Unwanted Code Deletion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Access" + "@value": "Unwanted Code Deletion" } ] }, { - "@id": "_:N8193907d23bd43dc8b146573989b8a0d", + "@id": "_:N9b03e23aa8864f4288a1885778e3b1e4", "@type": [ "https://schema.org/WebPage" ], @@ -5589,7 +5446,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExposureToHarmfulSpeech", + "@id": "https://w3id.org/dpv/risk/owl#CopyrightViolation", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -5614,7 +5471,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ne595b225e5ee4cc2b2374256ef05fa2e" + "@id": "_:N3984b17b1694455793b94c3ad850178d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5624,7 +5481,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5636,24 +5493,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Harmful Speech" + "@value": "Something that acts as or causes Copyright Violation" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Exposure to Harmful Speech" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0" + "@value": "Copyright Violation" } ] }, { - "@id": "_:Ne595b225e5ee4cc2b2374256ef05fa2e", + "@id": "_:N3984b17b1694455793b94c3ad850178d", "@type": [ "https://schema.org/WebPage" ], @@ -5669,10 +5520,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#EquipmentMalfunction", + "@id": "https://w3id.org/dpv/risk/owl#Scam", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5694,7 +5545,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N7f1dc230141c4448a99f28f362191020" + "@id": "_:Nea270aca30b44f5a8cfda049ee8bf631" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5704,7 +5555,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5716,24 +5570,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Equipment Malfunction" + "@value": "Something that acts as or causes Scam" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Equipment Malfunction" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here equipment refers to physical equipment" + "@value": "Scam" } ] }, { - "@id": "_:N7f1dc230141c4448a99f28f362191020", + "@id": "_:Nea270aca30b44f5a8cfda049ee8bf631", "@type": [ "https://schema.org/WebPage" ], @@ -5749,10 +5597,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataAccess", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemModification", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5774,7 +5622,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nc799e152712d4ee48d59c2a1366fca7f" + "@id": "_:N029a97b214024c18a899586cb3864d2a" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5783,6 +5631,9 @@ } ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, { "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } @@ -5796,34 +5647,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Access" + "@value": "Something that acts as or causes Unauthorised System Modification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Access" + "@value": "Unauthorised System Modification" } ] }, { - "@id": "_:Nc799e152712d4ee48d59c2a1366fca7f", + "@id": "_:N029a97b214024c18a899586cb3864d2a", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseGoodwill", + "@id": "https://w3id.org/dpv/risk/owl#Injury", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -5848,7 +5699,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N4f8237833a8141b2bb3c31cf5176bf42" + "@id": "_:Na6c5e17bb8ac4135b62412f66dd88460" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5858,7 +5709,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5870,18 +5721,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Goodwill" + "@value": "Something that acts as or causes Injury" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Goodwill" + "@value": "Injury" } ] }, { - "@id": "_:N4f8237833a8141b2bb3c31cf5176bf42", + "@id": "_:Na6c5e17bb8ac4135b62412f66dd88460", "@type": [ "https://schema.org/WebPage" ], @@ -5897,7 +5748,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Reward", + "@id": "https://w3id.org/dpv/risk/owl#PhysicalAssault", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -5905,13 +5756,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -5920,6 +5771,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6b8cf1ee50ba4ea081a101b53baf3bb3" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -5927,7 +5783,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5939,42 +5795,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee" + "@value": "Something that acts as or causes Physical Assault" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reward" + "@value": "Physical Assault" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityBreach", + "@id": "_:N6b8cf1ee50ba4ea081a101b53baf3bb3", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk/owl#DataBreach" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "accepted" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Benefit", + "@id": "https://w3id.org/dpv/risk/owl#PublicOrderBreach", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -5982,13 +5830,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -5997,6 +5845,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N1d102af8ecd94ce3a875a9a2a7e78bcc" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -6004,7 +5857,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6016,21 +5869,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes benefits" + "@value": "Something that acts as or causes Public Order Breach" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Benefit" + "@value": "Public Order Breach" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SexualViolence", + "@id": "_:N1d102af8ecd94ce3a875a9a2a7e78bcc", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Sabotage", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6052,7 +5921,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nbeddee22b7a841e39879764ab63949f8" + "@id": "_:N2fc72d8ce45943bcaad06c0a96aac629" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6062,7 +5931,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6074,18 +5949,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Sexual Violence" + "@value": "Something that acts as or causes Sabotage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sexual Violence" + "@value": "Sabotage" } ] }, { - "@id": "_:Nbeddee22b7a841e39879764ab63949f8", + "@id": "_:N2fc72d8ce45943bcaad06c0a96aac629", "@type": [ "https://schema.org/WebPage" ], @@ -6101,7 +5976,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseReputation", + "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccountCredentials", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -6126,7 +6001,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0282f3114f5b4278b632620b9b954c7d" + "@id": "_:N1005943ded74408ea68c811475686000" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6136,7 +6011,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6148,39 +6026,56 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Reputation" + "@value": "Something that acts as or causes Account Credentials to be compromised" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Reputation" + "@value": "Compromise Account Credentials" } ] }, { - "@id": "_:N0282f3114f5b4278b632620b9b954c7d", + "@id": "_:N1005943ded74408ea68c811475686000", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AccidentalMisuse", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedReidentification", "@type": [ "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-19" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -6188,7 +6083,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6200,18 +6098,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Accidental Misuse" + "@value": "Something that acts as or causes Unauthorised Re-Identification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Accidental Misuse" + "@value": "Unauthorised Re-Identification" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Spoofing", + "@id": "https://w3id.org/dpv/risk/owl#ErroneousSystemUse", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -6236,10 +6134,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N603a4b8fadf24d23ac9c224927644c9d" - }, - { - "@id": "_:N698cebdfba864777b23d25052c4d2493" + "@id": "_:N258e312c37aa4354bed73603ef7a36f6" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6249,10 +6144,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6264,34 +6156,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Spoofing" + "@value": "Something that acts as or causes Erroneous System Use" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Spoofing" - } - ] - }, - { - "@id": "_:N603a4b8fadf24d23ac9c224927644c9d", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Erroneous System Use" } ] }, { - "@id": "_:N698cebdfba864777b23d25052c4d2493", + "@id": "_:N258e312c37aa4354bed73603ef7a36f6", "@type": [ "https://schema.org/WebPage" ], @@ -6307,10 +6183,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MaterialDamage", + "@id": "https://w3id.org/dpv/risk/owl#SystemFailure", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6321,7 +6197,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -6330,6 +6206,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nd794c9a0064e4fe6bb3a0ebd38859b9b" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -6337,7 +6218,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6349,53 +6233,44 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Material Damage" + "@value": "Something that acts as or causes System Failure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Material Damage" + "@value": "System Failure" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" + "@value": "Here system refers to both hardware and software systems" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DenialServiceAttack", + "@id": "_:Nd794c9a0064e4fe6bb3a0ebd38859b9b", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/modified": [ + "https://schema.org/name": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nf82ac345e0fe44a394f7da0ec78ef801" - }, + "https://schema.org/url": [ { - "@id": "_:N51a29309d655420e8611a50e7d2baa7c" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -6403,8 +6278,17 @@ } ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, { "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6416,54 +6300,39 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Denial of Service Attack (DoS)" + "@value": "Something that acts as or causes Unauthorised Activity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Denial of Service Attack (DoS)" + "@value": "Unauthorised Activity" } ] }, { - "@id": "_:Nf82ac345e0fe44a394f7da0ec78ef801", + "@id": "https://w3id.org/dpv/risk/owl#Payment", "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } - ] - }, - { - "@id": "_:N51a29309d655420e8611a50e7d2baa7c", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/created": [ { - "@value": "ISO/IEC 27005:2018" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-04-14" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack", - "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -6472,7 +6341,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6484,21 +6353,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes an attack on security with the aim of undermining it" + "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Security Attack" + "@value": "Payment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseCredibility", + "@id": "https://w3id.org/dpv/risk/owl#ExposureToHarmfulSpeech", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6520,7 +6389,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N347037135ba54cefae0a2a69a47e52d9" + "@id": "_:N95f46ba999c74717949420ed05a75570" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6530,7 +6399,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6542,68 +6411,43 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Credibility" + "@value": "Something that acts as or causes Harmful Speech" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Credibility" - } - ] - }, - { - "@id": "_:N347037135ba54cefae0a2a69a47e52d9", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Exposure to Harmful Speech" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf", + "@id": "_:N95f46ba999c74717949420ed05a75570", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - RDF/XML serialiation" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.rdf" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "https://schema.org/url": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#FinancialLoss", + "@id": "https://w3id.org/dpv/risk/owl#MaliciousCodeAttack", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6625,7 +6469,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0296c48d481641d492572a05652b6bf5" + "@id": "_:N625dc3c061c74eec9f96d171c60fd3c0" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6635,7 +6479,16 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6647,37 +6500,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity" + "@value": "Something that acts as or causes Malicious Code Attack" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Loss" + "@value": "Malicious Code Attack" } ] }, { - "@id": "_:N0296c48d481641d492572a05652b6bf5", + "@id": "_:N625dc3c061c74eec9f96d171c60fd3c0", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemAccess", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6688,7 +6541,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -6697,6 +6550,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6fdf74981d95420a82b9c97acf9aa9eb" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -6704,7 +6562,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6716,24 +6580,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Non-Material Damage" + "@value": "Something that acts as or causes Unauthorised System Access" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Non-Material Damage" + "@value": "Unauthorised System Access" } + ] + }, + { + "@id": "_:N6fdf74981d95420a82b9c97acf9aa9eb", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeDisclosure", + "@id": "https://w3id.org/dpv/risk/owl#BruteForceAuthorisations", "@type": [ "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -6758,7 +6632,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N540e39aa17014568ba5a2b03534c1f19" + "@id": "_:Nb75b090fdcda4ec38e841680681bf642" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6767,8 +6641,14 @@ } ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, { "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6780,39 +6660,56 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Disclosure" + "@value": "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Disclosure" + "@value": "Brute Force Authorisations" } ] }, { - "@id": "_:N540e39aa17014568ba5a2b03534c1f19", + "@id": "_:Nb75b090fdcda4ec38e841680681bf642", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#EnvironmentalRisk", + "@id": "https://w3id.org/dpv/risk/owl#Compensation", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-04-14" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -6820,7 +6717,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6832,18 +6729,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that have their origin in environment or can affect the environment at large" + "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Environmental Risk" + "@value": "Compensation" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Discrimination", + "@id": "https://w3id.org/dpv/risk/owl#RightsLimitation", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -6851,13 +6748,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-08-18" } ], "http://purl.org/dc/terms/modified": [ @@ -6885,23 +6782,51 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Discrimination" + "@value": "Something that acts as or causes Limitation of Rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Discrimination" + "@value": "Limitation of Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk", + "@id": "https://w3id.org/dpv/risk/owl#IdentityFraud", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nc74530c53d534886a66e5a7f741398bb" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -6909,7 +6834,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6921,18 +6849,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that affect the reputation of the organisation" + "@value": "Something that acts as or causes Identity Fraud" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reputational Risk" + "@value": "Identity Fraud" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeModification", + "@id": "_:Nc74530c53d534886a66e5a7f741398bb", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Threat Taxonomy 2016" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Reward", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -6940,13 +6884,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], "http://purl.org/dc/terms/modified": [ @@ -6955,11 +6899,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N8ae12eb2b96a4c7e97a8739ee00ffe80" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -6967,7 +6906,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6979,37 +6918,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Modification" + "@value": "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Modification" - } - ] - }, - { - "@id": "_:N8ae12eb2b96a4c7e97a8739ee00ffe80", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "Reward" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolenceAgainstChildren", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataModification", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -7031,7 +6954,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb34535276ddd4a56ac18dcc8fc489cbb" + "@id": "_:Nb76ee4ad00614561b02ea8b1fd3da77c" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7041,7 +6964,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7053,24 +6979,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Child Violence" + "@value": "Something that acts as or causes Unauthorised Data Modification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violence against children" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ChildViolence\" in DPV 2.0" + "@value": "Unauthorised Data Modification" } ] }, { - "@id": "_:Nb34535276ddd4a56ac18dcc8fc489cbb", + "@id": "_:Nb76ee4ad00614561b02ea8b1fd3da77c", "@type": [ "https://schema.org/WebPage" ], @@ -7086,7 +7006,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Terrorism", + "@id": "https://w3id.org/dpv/risk/owl#DataBreach", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -7111,7 +7031,15 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nf6a25073f9274363bcb649fe8540fc70" + "@id": "_:N0353966748ad43cc9b9c03081ec6b6f9" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples/owl#E0071" + }, + { + "@id": "https://w3id.org/dpv/examples/owl#E0069" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7121,7 +7049,16 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7133,18 +7070,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Terrorism" + "@value": "Something that acts as or causes Data Breach" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Terrorism" + "@value": "Data Breach" } ] }, { - "@id": "_:Nf6a25073f9274363bcb649fe8540fc70", + "@id": "_:N0353966748ad43cc9b9c03081ec6b6f9", "@type": [ "https://schema.org/WebPage" ], @@ -7160,7 +7097,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PersonalSafetyEndangerment", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataAccess", "@type": [ "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -7185,7 +7122,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Na66b6d002d3f448981a58870da1a686e" + "@id": "_:N0eacc049940646a99623da2cd6a2d394" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7195,7 +7132,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7207,34 +7147,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Personal Safety Endangerment" + "@value": "Something that acts as or causes Unauthorised Data Access" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Personal Safety Endangerment" + "@value": "Unauthorised Data Access" } ] }, { - "@id": "_:Na66b6d002d3f448981a58870da1a686e", + "@id": "_:N0eacc049940646a99623da2cd6a2d394", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RightsViolation", + "@id": "https://w3id.org/dpv/risk/owl#UnwantedDataDeletion", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -7242,13 +7182,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -7257,6 +7197,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nde382e9a51c445d69476b298827b1cbe" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -7264,7 +7209,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7276,60 +7227,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Rights" + "@value": "Something that acts as or causes Unwanted Data Deletion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0" + "@value": "Unwanted Data Deletion" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk", + "@id": "_:Nde382e9a51c445d69476b298827b1cbe", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/owl#RiskConcept" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "Risks and issues that have their basis in legal requirements and enforcement" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Legal Risk" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingPolicy", + "@id": "https://w3id.org/dpv/risk/owl#IntentionalMisuse", "@type": [ "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -7342,7 +7267,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7354,21 +7279,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes violation of policy which can be either internal or external policy" + "@value": "Intentional Misuse" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Policy" + "@value": "Intentional Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingContractualObligation", + "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -7379,7 +7304,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-30" } ], "http://purl.org/dc/terms/modified": [ @@ -7388,11 +7313,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N1802c2900f5b4c578896c91c3149381d" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -7406,60 +7326,80 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Contractual Obligations" + "@value": "Something that acts as or causes Non-Material Damage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Contractual Obligation" + "@value": "Non-Material Damage" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0" + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" } ] }, { - "@id": "_:N1802c2900f5b4c578896c91c3149381d", + "@id": "https://w3id.org/dpv/risk/owl#JudicialPenalty", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that involves or causes judicial penalties to be paid" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Judicial Penalty" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Misuse", + "@id": "https://w3id.org/dpv/risk/owl#Detriment", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Delaram Golpayegani" + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-06-11" + "@value": "2022-03-23" } ], "http://purl.org/dc/terms/modified": [ @@ -7475,7 +7415,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7487,18 +7427,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Misuse" + "@value": "Something that acts as or causes Detriment" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Misuse" + "@value": "Detriment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DistributedDenialServiceAttack", + "@id": "https://w3id.org/dpv/risk/owl#LoseCredibility", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -7523,7 +7463,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N842f6dd3b92c482180f56ce6a495c382" + "@id": "_:N2c068c379d9b4c2b8da0937ad8be6a81" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7533,7 +7473,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7545,18 +7485,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Distributed Denial of Service Attack (DDoS)" + "@value": "Something that acts as or causes Loss of Credibility" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Distributed Denial of Service Attack (DDoS)" + "@value": "Lose of Credibility" } ] }, { - "@id": "_:N842f6dd3b92c482180f56ce6a495c382", + "@id": "_:N2c068c379d9b4c2b8da0937ad8be6a81", "@type": [ "https://schema.org/WebPage" ], @@ -7572,7 +7512,38 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataModification", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-html", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - HTML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.html" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/specification" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeAccess", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -7597,7 +7568,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Naa83e8f3fb5e4e9a88398292112d68f3" + "@id": "_:N99568e0cd3774d348d85262f04bc3a0b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7606,6 +7577,12 @@ } ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, { "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } @@ -7619,29 +7596,56 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Modification" + "@value": "Something that acts as or causes Unauthorised Code Access" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Modification" + "@value": "Unauthorised Code Access" } ] }, { - "@id": "_:Naa83e8f3fb5e4e9a88398292112d68f3", + "@id": "_:N99568e0cd3774d348d85262f04bc3a0b", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityBreach", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#DataBreach" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" } ] }, @@ -7676,7 +7680,43 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Reidentification", + "@id": "https://w3id.org/dpv/risk/owl#UserRisks", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/owl#RiskConcept" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concepts associated with risks that arise due to User or Human use" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "User Risks" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#LoseNegotiatingCapacity", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -7690,7 +7730,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -7699,6 +7739,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nf8d97cf300cf44d5881be9535d0b1dff" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -7706,7 +7751,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7718,29 +7763,61 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Re-identification" + "@value": "Something that acts as or causes Loss of Negotiating Capacity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Re-identification" + "@value": "Lose of Negotiating Capacity" + } + ] + }, + { + "@id": "_:Nf8d97cf300cf44d5881be9535d0b1dff", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#InternalSecurityThreat", + "@id": "https://w3id.org/dpv/risk/owl#InterceptCommunications", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N1f36b972c50f49fb9b474152b57cf474" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -7748,25 +7825,50 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Concepts associated with security threats and issues that originate within the organisation" + "@value": "Something that acts as or causes Interception of Communications" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Internal Security Threat" + "@value": "Intercept Communications" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0" + } + ] + }, + { + "@id": "_:N1f36b972c50f49fb9b474152b57cf474", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" } ] } diff --git a/2.1-dev/risk/modules/risk_consequences-owl.n3 b/2.1-dev/risk/modules/risk_consequences-owl.n3 index 100050053..1fdb2d194 100644 --- a/2.1-dev/risk/modules/risk_consequences-owl.n3 +++ b/2.1-dev/risk/modules/risk_consequences-owl.n3 @@ -34,7 +34,9 @@ risk-owl:AuthorisationFailure a rdfs:Class, schema:name "ENISa Trust Services Security Incidents 2021" ; schema:url "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Authorisation Failure"@en ; skos:prefLabel "Authorisation Failure"@en . @@ -43,7 +45,8 @@ risk-owl:AvailabilityBreach a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:DataBreach ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:DataBreach ; sw:term_status "accepted"@en . risk-owl:Benefit a rdfs:Class, @@ -68,7 +71,8 @@ risk-owl:Blackmail a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Blackmail"@en ; skos:prefLabel "Blackmail"@en . @@ -83,7 +87,9 @@ risk-owl:BruteForceAuthorisations a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; skos:prefLabel "Brute Force Authorisations"@en . @@ -98,7 +104,8 @@ risk-owl:Coercion a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Coercion"@en ; skos:prefLabel "Coercion"@en . @@ -119,7 +126,8 @@ risk-owl:ComponentFailure a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Component Failure"@en ; skos:prefLabel "Component Failure"@en ; @@ -129,7 +137,8 @@ risk-owl:ComponentMalfunction a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Component Malfunction"@en ; skos:prefLabel "Component Malfunction"@en ; @@ -145,7 +154,10 @@ risk-owl:CompromiseAccount a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ; skos:prefLabel "Compromise Account"@en . @@ -160,7 +172,8 @@ risk-owl:CompromiseAccountCredentials a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ; skos:prefLabel "Compromise Account Credentials"@en . @@ -175,7 +188,8 @@ risk-owl:ConfidentialityBreach a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:DataBreach ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:DataBreach ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Confidentiality Breach"@en ; skos:prefLabel "Confidentiality Breach"@en . @@ -205,7 +219,8 @@ risk-owl:Cryptojacking a rdfs:Class, schema:name "ENISA Threat Landscape 2021" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Cryptojacking"@en ; skos:prefLabel "Cryptojacking"@en . @@ -234,7 +249,10 @@ risk-owl:DataBreach a rdfs:Class, vann:example dex-owl:E0069, dex-owl:E0071 ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SecurityBreach ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:SecurityBreach ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Data Breach"@en ; skos:prefLabel "Data Breach"@en . @@ -249,7 +267,8 @@ risk-owl:DataCorruption a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:IntegrityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Corruption of Data"@en ; skos:prefLabel "Data Corruption"@en ; @@ -262,13 +281,11 @@ risk-owl:DenialServiceAttack a rdfs:Class, dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ], - [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ; skos:prefLabel "Denial of Service Attack (DoS)"@en . @@ -307,7 +324,8 @@ risk-owl:DistributedDenialServiceAttack a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ; skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en . @@ -331,7 +349,8 @@ risk-owl:EquipmentFailure a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Equipment Failure"@en ; skos:prefLabel "Equipment Failure"@en ; @@ -347,7 +366,8 @@ risk-owl:EquipmentMalfunction a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Equipment Malfunction"@en ; skos:prefLabel "Equipment Malfunction"@en ; @@ -403,7 +423,8 @@ risk-owl:Extorsion a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Extorsion"@en ; skos:prefLabel "Extorsion"@en . @@ -455,7 +476,8 @@ risk-owl:Fraud a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Fraud"@en ; skos:prefLabel "Fraud"@en . @@ -498,7 +520,8 @@ risk-owl:IdentityFraud a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Identity Fraud"@en ; skos:prefLabel "Identity Fraud"@en . @@ -513,7 +536,8 @@ risk-owl:IdentityTheft a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Identity Theft"@en ; skos:prefLabel "Identity Theft"@en . @@ -568,7 +592,8 @@ risk-owl:IntegrityBreach a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:DataBreach ; + rdfs:subClassOf risk-owl:DataBreach, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en . risk-owl:IntentionalMisuse a rdfs:Class, @@ -590,21 +615,13 @@ risk-owl:InterceptCommunications a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Interception of Communications"@en ; skos:prefLabel "Intercept Communications"@en ; skos:scopeNote "This concept was called \"InterceptionCommunications\" in DPV 2.0"@en . -risk-owl:InternalSecurityThreat a rdfs:Class, - owl:Class, - dpv-owl:RiskConcept ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:RiskConcept ; - sw:term_status "accepted"@en ; - skos:definition "Concepts associated with security threats and issues that originate within the organisation"@en ; - skos:prefLabel "Internal Security Threat"@en . - risk-owl:JudicialCosts a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; @@ -747,7 +764,10 @@ risk-owl:MaliciousCodeAttack a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Malicious Code Attack"@en ; skos:prefLabel "Malicious Code Attack"@en . @@ -762,7 +782,10 @@ risk-owl:MalwareAttack a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Malware Attack"@en ; skos:prefLabel "Malware Attack"@en . @@ -851,7 +874,8 @@ risk-owl:PhishingScam a rdfs:Class, schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Phishing Scam"@en ; skos:prefLabel "Phishing Scam"@en . @@ -924,7 +948,8 @@ risk-owl:Reidentification a rdfs:Class, dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Re-identification"@en ; skos:prefLabel "Re-identification"@en ; @@ -1029,7 +1054,9 @@ risk-owl:Sabotage a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Sabotage"@en ; skos:prefLabel "Sabotage"@en . @@ -1044,7 +1071,8 @@ risk-owl:Scam a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Scam"@en ; skos:prefLabel "Scam"@en . @@ -1053,7 +1081,10 @@ risk-owl:SecurityAttack a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ; skos:prefLabel "Security Attack"@en . @@ -1068,7 +1099,10 @@ risk-owl:SecurityBreach a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Security Breach"@en ; skos:prefLabel "Security Breach"@en . @@ -1130,7 +1164,9 @@ risk-owl:Spoofing a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat, + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept, risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Spoofing"@en ; @@ -1146,7 +1182,8 @@ risk-owl:SystemFailure a rdfs:Class, schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes System Failure"@en ; skos:prefLabel "System Failure"@en ; @@ -1162,7 +1199,10 @@ risk-owl:SystemIntrusion a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes System Intrusion"@en ; skos:prefLabel "System Intrusion"@en . @@ -1177,7 +1217,8 @@ risk-owl:SystemMalfunction a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes System Malfunction"@en ; skos:prefLabel "System Malfunction"@en ; @@ -1208,7 +1249,10 @@ risk-owl:UnauthorisedAccesstoPremises a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ; skos:prefLabel "Unauthorised Access to Premises"@en . @@ -1217,7 +1261,10 @@ risk-owl:UnauthorisedActivity a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Activity"@en ; skos:prefLabel "Unauthorised Activity"@en . @@ -1232,7 +1279,9 @@ risk-owl:UnauthorisedCodeAccess a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Code Access"@en ; skos:prefLabel "Unauthorised Code Access"@en . @@ -1247,7 +1296,8 @@ risk-owl:UnauthorisedCodeDisclosure a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ; skos:prefLabel "Unauthorised Code Disclosure"@en . @@ -1262,7 +1312,8 @@ risk-owl:UnauthorisedCodeModification a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ; skos:prefLabel "Unauthorised Code Modification"@en . @@ -1277,7 +1328,8 @@ risk-owl:UnauthorisedDataAccess a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Data Access"@en ; skos:prefLabel "Unauthorised Data Access"@en . @@ -1292,7 +1344,8 @@ risk-owl:UnauthorisedDataDisclosure a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ; skos:prefLabel "Unauthorised Data Disclosure"@en . @@ -1307,7 +1360,8 @@ risk-owl:UnauthorisedDataModification a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ; skos:prefLabel "Unauthorised Data Modification"@en . @@ -1322,7 +1376,8 @@ risk-owl:UnauthorisedInformationDisclosure a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ; skos:prefLabel "Unauthorised Information Disclosure"@en . @@ -1334,7 +1389,8 @@ risk-owl:UnauthorisedReidentification a rdfs:Class, dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ; skos:prefLabel "Unauthorised Re-Identification"@en . @@ -1349,7 +1405,8 @@ risk-owl:UnauthorisedResourceUse a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ; skos:prefLabel "Unauthorised Resource Use"@en . @@ -1364,7 +1421,9 @@ risk-owl:UnauthorisedSystemAccess a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised System Access"@en ; skos:prefLabel "Unauthorised System Access"@en . @@ -1379,7 +1438,8 @@ risk-owl:UnauthorisedSystemModification a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised System Modification"@en ; skos:prefLabel "Unauthorised System Modification"@en . @@ -1394,7 +1454,9 @@ risk-owl:UnwantedCodeDeletion a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ; skos:prefLabel "Unwanted Code Deletion"@en . @@ -1409,7 +1471,9 @@ risk-owl:UnwantedDataDeletion a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ; skos:prefLabel "Unwanted Data Deletion"@en . @@ -1424,7 +1488,8 @@ risk-owl:UnwantedDisclosureData a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ; skos:prefLabel "Unwanted Disclosure of Data"@en . @@ -1543,21 +1608,6 @@ risk-owl:ViolenceAgainstChildren a rdfs:Class, skos:prefLabel "Violence against children"@en ; skos:scopeNote "This concept was called \"ChildViolence\" in DPV 2.0"@en . -risk-owl:VulnerabilityCreated a rdfs:Class, - owl:Class, - dpv-owl:RiskConcept ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:modified "2024-08-16"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:InternalSecurityThreat ; - sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Vulnerability Created"@en ; - skos:prefLabel "Vulnerability Created"@en . - risk-owl:serialisation-html a profile:ResourceDescriptor ; dct:conformsTo ; dct:format ; diff --git a/2.1-dev/risk/modules/risk_consequences-owl.rdf b/2.1-dev/risk/modules/risk_consequences-owl.rdf index a24cf3b5f..9c7cdd832 100644 --- a/2.1-dev/risk/modules/risk_consequences-owl.rdf +++ b/2.1-dev/risk/modules/risk_consequences-owl.rdf @@ -12,1997 +12,2039 @@ xmlns:sw="http://www.w3.org/2003/06/sw-vocab-status/ns#" xmlns:vann="http://purl.org/vocab/vann/" > - + + modified + Georg P. Krog, Harshvardhan J. Pandit - modified + Fee + DGA 2.10 + Something that acts as or provides fees e.g. for using a service 2024-08-16 - Something that acts as or causes Violation of Contractual Obligations - - This concept was called "ViolationContractualObligations" in DPV 2.0 - Violation of Contractual Obligation - 2022-08-17 - Harshvardhan J. Pandit - + 2024-04-14 + - + + accepted + 2024-08-16 + Exposure to Harmful Speech - Something that acts as or causes Loss of Negotiating Capacity - - Harshvardhan J. Pandit + This concept was called "HarmfulSpeech" in DPV 2.0 2022-08-17 - accepted - 2024-08-16 - Lose of Negotiating Capacity - + Harshvardhan J. Pandit + Something that acts as or causes Harmful Speech + + - - Compensation - + - 2024-04-14 - Georg P. Krog, Harshvardhan J. Pandit + 2022-08-17 + + + Harshvardhan J. Pandit + Something that acts as or causes Physical Assault accepted - Something that acts as or provides compensation - which can be monetary and financial or in other forms 2024-08-16 - + Physical Assault + - + + 2024-08-16 + Lose of Negotiating Capacity + + + + 2022-08-17 - Harshvardhan J. Pandit - modified + accepted + Something that acts as or causes Loss of Negotiating Capacity + + + + + 2022-08-19 + 2024-08-16 - 2024-08-16 - 2022-08-17 - Something that acts as or causes Corruption of Data - Data Corruption - This concept was called "Corruption Data" in DPV 2.0 + + Harshvardhan J. Pandit + Re-identification + Something that acts as or causes Re-identification + Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification + accepted + - + + + + Something that acts as or causes an attack on security with the aim of undermining it + + accepted + Security Attack + + + + + + + Something that acts as or causes Child Violence + 2024-08-16 + - Public Order Breach - Harshvardhan J. Pandit + Violence against children accepted - 2024-08-16 2022-08-17 - Something that acts as or causes Public Order Breach - + + This concept was called "ChildViolence" in DPV 2.0 + - - Harshvardhan J. Pandit - accepted + + 2024-08-16 - 2024-08-16 2022-08-17 - Something that acts as or causes a compromised account that is then used by the compromiser - Compromise Account + Something that acts as or causes Loss of Goodwill - - + Harshvardhan J. Pandit + + accepted + Lose of Goodwill + - - 2024-08-16 + accepted + Risks and issues that affect the reputation of the organisation - This concept was called "HarmfulSpeech" in DPV 2.0 - 2022-08-17 - Something that acts as or causes Harmful Speech - Exposure to Harmful Speech + Reputational Risk - Harshvardhan J. Pandit - - + - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - Violation of Rights + + accepted + Something that acts as or causes Component Malfunction - Georg P. Krog, Harshvardhan J. Pandit - 2022-08-18 - Something that acts as or causes Violation of Rights - 2024-08-16 - This concept was called "ViolationOfRights" in DPV 2.0 + Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of - accepted - + Component Malfunction + + - - Security Breach + + Something that acts as or causes Unauthorised Data Disclosure + 2024-08-16 - Something that acts as or causes Security Breach - Harshvardhan J. Pandit - 2024-08-16 - accepted 2022-08-17 - - + + + Harshvardhan J. Pandit + Unauthorised Data Disclosure + + - + + Something that acts as or causes Component Failure + Component Failure accepted - + Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of + + - - 2022-08-17 - Violating Code of Conduct - + - modified + Here equipment refers to physical equipment + Something that acts as or causes Equipment Failure 2024-08-16 + 2022-08-17 + Harshvardhan J. Pandit - Something that acts as or causes Violation of Code of Conduct - - This concept was called "ViolationCodeConduct" in DPV 2.0 - + Equipment Failure + accepted + + + - - + + Unauthorised Re-Identification + Georg P. Krog + 2022-08-19 + 2024-08-16 + + Something that acts as or causes Unauthorised Re-Identification + accepted + + + + Harshvardhan J. Pandit + + + + Compromise Account + Something that acts as or causes a compromised account that is then used by the compromiser accepted - Unwanted Data Deletion + 2024-08-16 2022-08-17 - Something that acts as or causes Unwanted Data Deletion - + + + + - - accepted + + 2024-08-16 - 2024-08-16 + Something that acts as or causes Sabotage + Sabotage 2022-08-17 - Unauthorised Code Modification + Harshvardhan J. Pandit - - Something that acts as or causes Unauthorised Code Modification + accepted + + - - - Illegal Data Processing - - - - 2024-08-16 - Something that acts as or causes Illegal Processing of Data - This concept was called "IllegalProcessingData" in DPV 2.0 + Harshvardhan J. Pandit accepted - 2022-08-17 - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - - 2024-08-16 - + Something that acts as or causes Account Credentials to be compromised + + Compromise Account Credentials + 2024-08-16 + - accepted - The criteria for what is considered material damage is based in jurisdictional laws and norms - Material Damage - Harshvardhan J. Pandit - 2022-03-30 - Something that acts as or causes Material Damage - + + - 2022-08-17 - Something that acts as or causes Unauthorised Information Disclosure - - Unauthorised Information Disclosure - + + accepted 2024-08-16 - + Unauthorised Information Disclosure + Something that acts as or causes Unauthorised Information Disclosure + 2022-08-17 + Harshvardhan J. Pandit - accepted + + - - Harshvardhan J. Pandit - Something that acts as or causes System Malfunction + accepted - + + 2024-08-16 + - 2024-08-16 - - Here system refers to both hardware and software systems + Harshvardhan J. Pandit + Psychological Harm 2022-08-17 - System Malfunction + Something that acts as or causes Psychological Harm + + + + + + + 2024-08-16 + Authorisation Failure + Something that acts as or causes Authorisation Failure + + accepted + 2022-08-17 + + Harshvardhan J. Pandit + + - - - ENISA Reference Incident Classification Taxonomy 2018 + + + + + accepted + Something that involves or causes judicial penalties to be paid + + Judicial Penalty + + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 + - + + The criteria for what is considered material damage is based in jurisdictional laws and norms + 2022-03-30 + Something that acts as or causes Non-Material Damage + + Harshvardhan J. Pandit + accepted + 2024-08-16 + Non-Material Damage + + + Harshvardhan J. Pandit + 2022-08-17 - - - Something that acts as or causes Spoofing - Spoofing + + + + Something that acts as or causes Unauthorised Code Disclosure accepted 2024-08-16 + Unauthorised Code Disclosure - + - - + + 2024-08-16 + - 2024-08-16 + 2022-08-17 Harshvardhan J. Pandit - - 2022-08-17 - Violation of Legal Obligations - Something that acts as or causes Violation of Legal Obligations - This concept was called "ViolationRegulatoryObligations" in DPV 2.0 - modified - + Malware Attack + accepted + + Something that acts as or causes Malware Attack + + + + - + + Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques + 2024-08-16 - Injury Harshvardhan J. Pandit + + Brute Force Authorisations accepted - Something that acts as or causes Injury - - 2024-08-16 2022-08-17 - - - - https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 - - - ENISA Threat Landscape for Ransomware Attacks 2022 - - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + + + - - accepted - - Something that acts as or causes Account Credentials to be compromised - Compromise Account Credentials + - Harshvardhan J. Pandit - 2022-08-17 - 2024-08-16 - - - - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - ENISA Threat Taxonomy 2016 + Accidental Misuse + accepted + Accidental Misuse + - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - + + - Unauthorised Code Disclosure + Unauthorised Access to Premises + 2022-08-17 Harshvardhan J. Pandit - Something that acts as or causes Unauthorised Code Disclosure - 2024-08-16 - 2022-08-17 - accepted + Something that acts as or causes Unauthorised Access to Premises + 2024-08-16 + + + + - - 2022-08-17 - + + - Harshvardhan J. Pandit - 2024-08-16 - Something that acts as or causes Physical Assault accepted - - Physical Assault - - - - - - + Something that acts as or causes Unauthorised Data Modification + Unauthorised Data Modification 2024-08-16 - Fraud - - - accepted - Something that acts as or causes Fraud 2022-08-17 + Harshvardhan J. Pandit + - - ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html + + + + + Risks and issues that affect or have the potential to affect specific individuals + accepted + Individual Risk - + + Here equipment refers to physical equipment + + accepted 2022-08-17 - Blackmail - Harshvardhan J. Pandit - Something that acts as or causes Blackmail + Equipment Malfunction 2024-08-16 - - accepted - + Harshvardhan J. Pandit + Something that acts as or causes Equipment Malfunction + + - + accepted + 2022-08-17 + 2024-08-16 + + Harshvardhan J. Pandit + Something that acts as or causes System Intrusion + System Intrusion - Something that acts as or causes Component Failure - Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of - Component Failure - + + + + - + + Financial Loss + Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity + 2024-08-16 + + + Harshvardhan J. Pandit accepted - 2024-08-16 2022-08-17 - Something that acts as or causes Unauthorised Access to Premises - - Unauthorised Access to Premises + + + + + ENISA Reference Incident Classification Taxonomy 2018 + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + Detriment - + Something that acts as or causes Detriment + 2022-03-23 + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves + 2024-08-16 + accepted + + + + + + + + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres + + Something that acts as or causes benefits + 2022-03-23 + accepted + Benefit + 2024-08-16 + + + + ISO/IEC 27005:2018 + + https://www.iso.org/standard/75281.html - Delaram Golpayegani + 2024-06-11 + accepted + Misuse + Something that acts as or causes Misuse 2024-08-16 + Delaram Golpayegani + + + + 2024-08-16 + Limitation of Rights + + + - Misuse + 2022-08-18 + This concept was called "LimitationOfRights" in DPV 2.0 accepted - 2024-06-11 - + Something that acts as or causes Limitation of Rights + Georg P. Krog, Harshvardhan J. Pandit + - - - Axel Polleres - Julian Flake - Fajar Ekaputra - Beatriz Esteves - Delaram Golpayegani - Georg P. Krog + + Something that acts as or causes Denial of Service Attack (DoS) + Harshvardhan J. Pandit - Delaram Golpayegani - Beatriz Esteves - Julian Flake - Rob Brennan - Harshvardhan J. Pandit - Paul Ryan - Georg P. Krog - https://w3id.org/dpv/risk - 2.1-dev - https://w3id.org/dpv/risk# - - - - - 2024-07-13 - 2022-08-14 - Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management - - - - - - - - - 2.1-dev - 10.5281/zenodo.12505841 - - http://www.w3.org/2004/02/skos/core - - http://www.w3.org/2000/01/rdf-schema - Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 - - - - 2022-08-14 - http://purl.org/ontology/bibo/status/published - RISK - Risk Concepts - - - risk - - + Denial of Service Attack (DoS) + accepted + 2022-08-17 + 2024-08-16 - 2024-04-14 - Georg P. Krog, Harshvardhan J. Pandit - Fee - DGA 2.10 - Something that acts as or provides fees e.g. for using a service - modified + + + + + + accepted + 2022-08-17 2024-08-16 + + + + + Something that acts as or causes Malicious Code Attack - + Harshvardhan J. Pandit + Malicious Code Attack + + + + - - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves + - - Detriment - accepted + Something that acts as or causes Scam 2024-08-16 - 2022-03-23 - Something that acts as or causes Detriment - - - - + 2022-08-17 - Something that acts as or causes Loss of Customer Confidence - Lose of Customer Confidence - - - Harshvardhan J. Pandit - 2024-08-16 accepted - + Scam + + - + + ENISa Trust Services Security Incidents 2021 + + https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 + + + Harshvardhan J. Pandit + accepted + 2022-08-17 - Something that acts as or causes Identity Theft - - Harshvardhan J. Pandit - Identity Theft - accepted + Something that acts as or causes Security Breach + + Security Breach 2024-08-16 - 2022-08-17 + + + - - + + - Violence against children - Harshvardhan J. Pandit - Something that acts as or causes Child Violence - 2024-08-16 - 2022-08-17 - This concept was called "ChildViolence" in DPV 2.0 - + Something that acts as or causes Social Disadvantage accepted - + 2024-08-16 + Georg P. Krog + Social Disadvantage + 2022-08-19 + - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ENISA Methodology for Sectoral Cybersecurity Assessments - - Accidental Misuse - Accidental Misuse + - - accepted - - - - Something that acts as or causes Data Breach accepted - - - - - - 2024-08-16 - 2022-08-17 - Data Breach - Harshvardhan J. Pandit - + Intentional Misuse + Intentional Misuse - + - + + Unwanted Code Deletion - Something that acts as or causes Terrorism - - - Harshvardhan J. Pandit - 2024-08-16 - - Terrorism - accepted - 2022-08-17 - - - - Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques - Harshvardhan J. Pandit - 2022-08-17 accepted - Brute Force Authorisations + Something that acts as or causes Unwanted Code Deletion + + 2022-08-17 2024-08-16 - - + + - - - - - - Something that acts as or causes Component Malfunction - Component Malfunction - Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of - accepted - + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + - - Unauthorised System Modification - Harshvardhan J. Pandit - accepted - - - - + 2024-08-16 + This concept was called "ViolationEthicalCode" in DPV 2.0 2022-08-17 - Something that acts as or causes Unauthorised System Modification - - - + Harshvardhan J. Pandit - accepted - - + + Something that acts as or causes Violation of Ethics Code + Violating Ethics Code + modified + - + + Harshvardhan J. Pandit - accepted + Unwanted Disclosure of Data + 2022-08-17 + Something that acts as or causes Unwanted Disclosure of Data + accepted + 2024-08-16 - 2022-08-17 - - Here system refers to both hardware and software systems - Something that acts as or causes System Failure - System Failure - - + + - + + accepted 2024-08-16 - 2022-08-17 - + - Harshvardhan J. Pandit - Sexual Violence - accepted - - Something that acts as or causes Sexual Violence - - - - https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 + 2024-04-14 + Something that acts as or provides renumeration which is in monetary or financial form + Georg P. Krog, Harshvardhan J. Pandit + Remuneration + - + + Something that acts as or causes Distributed Denial of Service Attack (DDoS) 2024-08-16 - 2022-08-17 - + - - Phishing Scam - Something that acts as or causes Phishing Scam Harshvardhan J. Pandit + Distributed Denial of Service Attack (DDoS) accepted + 2022-08-17 + + - - https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - + + 2024-08-16 + Terrorism + - This concept was called "PreventExercisingOfRights" in DPV 2.0 - Something that acts as or causes Prevent Exercising of Rights - Georg P. Krog, Harshvardhan J. Pandit - 2022-08-18 - 2024-08-16 - Prevent Exercising of Rights + Harshvardhan J. Pandit accepted + 2022-08-17 + Something that acts as or causes Terrorism + - - Something that acts as or causes Erroneous System Use - 2022-08-17 - Erroneous System Use - - - - Harshvardhan J. Pandit - 2024-08-16 - - - accepted - + + + + + + Risk Concepts - RDF/XML serialiation + - - modified - Something that acts as or causes Violation of Ethics Code + + ISO/IEC 27005:2018 + + https://www.iso.org/standard/75281.html + + - 2024-08-16 + Unauthorised Code Modification + Something that acts as or causes Unauthorised Code Modification + 2022-08-17 - Violating Ethics Code - - This concept was called "ViolationEthicalCode" in DPV 2.0 Harshvardhan J. Pandit - - - - - Something that acts as or causes Distributed Denial of Service Attack (DDoS) accepted - 2022-08-17 - Distributed Denial of Service Attack (DDoS) - - - - - Harshvardhan J. Pandit 2024-08-16 + - + + 2022-08-17 + accepted - Something that acts as or causes Psychological Harm - - Harshvardhan J. Pandit - Psychological Harm - accepted + 2024-08-16 - 2022-08-17 - - - - + Something that acts as or causes Identity Theft + Identity Theft - - - - - Lose of Trust Harshvardhan J. Pandit - 2022-08-17 - accepted - 2024-08-16 - Something that acts as or causes Loss of Trust - + + - - 2024-08-16 - Something that acts as or causes Malicious Code Attack - - accepted + + 2024-08-16 + + Harshvardhan J. Pandit + Intercept Communications + This concept was called "InterceptionCommunications" in DPV 2.0 2022-08-17 - Malicious Code Attack - + Something that acts as or causes Interception of Communications + modified + - - https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 + + https://www.iso.org/standard/75281.html - + + 2022-08-17 + This concept was called "ViolationCodeConduct" in DPV 2.0 + Violating Code of Conduct + Something that acts as or causes Violation of Code of Conduct + 2024-08-16 - 2022-08-17 - Something that acts as or causes Violation of Statutory Obligations - Violation of Statutory Obligations - - Harshvardhan J. Pandit - This concept was called "ViolationStatutoryObligations" in DPV 2.0 modified + Harshvardhan J. Pandit - - - Harshvardhan J. Pandit - - accepted - 2024-08-16 - Lose of Goodwill - + + modified + + Violation of Legal Obligations + Something that acts as or causes Violation of Legal Obligations + 2024-08-16 2022-08-17 - Something that acts as or causes Loss of Goodwill - + + + Harshvardhan J. Pandit + This concept was called "ViolationRegulatoryObligations" in DPV 2.0 + - - https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - 2022-08-17 - + + 2024-08-16 + - Something that acts as or causes Personal Safety Endangerment Harshvardhan J. Pandit - Personal Safety Endangerment - 2024-08-16 - + Lose of Credibility + + Something that acts as or causes Loss of Credibility accepted - + 2022-08-17 + - - accepted + - Harshvardhan J. Pandit 2022-08-17 - Something that acts as or causes Vulnerability Created - + Harshvardhan J. Pandit + Something that acts as or causes Loss of Reputation + accepted + Lose of Reputation + 2024-08-16 - Vulnerability Created - + - - Something that acts as or causes Confidentiality Breach - Confidentiality Breach - + + - 2024-08-16 - - 2022-08-17 - Harshvardhan J. Pandit accepted + - + + 2024-08-16 - Privacy - accepted + Payment - - - - Something that acts as or causes Malware Attack + 2024-04-14 accepted + Something that acts as or provides payment e.g. to access a service or purchase resources + Georg P. Krog, Harshvardhan J. Pandit + + + - Harshvardhan J. Pandit - 2024-08-16 + Lose of Trust + Something that acts as or causes Loss of Trust 2022-08-17 - - Malware Attack - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - accepted - - - - - Internal Security Threat - Concepts associated with security threats and issues that originate within the organisation - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + 2024-08-16 + Harshvardhan J. Pandit + + - - + + - Harshvardhan J. Pandit - 2024-08-16 - Something that acts as or causes Human Errors + Harshvardhan J. Pandit + + accepted - Human Errors + Something that acts as or causes Data Breach 2022-08-17 - - - - ENISA Threat Taxonomy 2016 - - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + 2024-08-16 + Data Breach + + + + - - - Lose of Reputation - - - - - Harshvardhan J. Pandit - 2022-08-17 + + Something that acts as or causes Sexual Violence accepted 2024-08-16 - Something that acts as or causes Loss of Reputation - - - - - Lose of Opportunity - + + - Something that acts as or causes Loss of Opportunity + Sexual Violence Harshvardhan J. Pandit - 2024-08-16 - accepted 2022-08-17 - + - - + + Here system refers to both hardware and software systems + + 2024-08-16 + - Something that acts as or causes Unauthorised Resource Use + 2022-08-17 - Unauthorised Resource Use Harshvardhan J. Pandit - 2024-08-16 - 2022-08-17 - + System Failure accepted - + Something that acts as or causes System Failure + + - - Risks and issues that affect or have the potential to affect specific individuals - Individual Risk - accepted + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + + Something that acts as or causes Violation of Statutory Obligations + modified + This concept was called "ViolationStatutoryObligations" in DPV 2.0 + 2024-08-16 + 2022-08-17 + Violation of Statutory Obligations + Harshvardhan J. Pandit + - + 2022-08-17 - Something that acts as or causes Unauthorised Data Modification - Unauthorised Data Modification - + + - Harshvardhan J. Pandit + accepted 2024-08-16 + Spoofing - accepted + Harshvardhan J. Pandit + Something that acts as or causes Spoofing + + + - - Guides for Data Privacy Vocabulary - - - - - - - + - Societal Health & Safety accepted + + Identity Fraud + Something that acts as or causes Identity Fraud + 2024-08-16 + 2022-08-17 - - - - Examples for Data Privacy Vocabulary - - - - - + Harshvardhan J. Pandit + + - + + + 2024-08-16 + 2022-08-17 + + Harshvardhan J. Pandit + Violation of Contractual Obligation + + + This concept was called "ViolationContractualObligations" in DPV 2.0 + modified + Something that acts as or causes Violation of Contractual Obligations + + + + ENISA Methodology for Sectoral Cybersecurity Assessments + + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + 2024-08-16 + Something that acts as or causes Human Errors + + Harshvardhan J. Pandit accepted - Risks and issues that affect or have the potential to affect society at large or specific groups in society - Societal Risk - + 2022-08-17 + Human Errors + + - - accepted - Something that acts as or causes Impact to Rights + + + Julian Flake + Fajar Ekaputra Harshvardhan J. Pandit - 2022-08-17 + Beatriz Esteves + Axel Polleres + Georg P. Krog + Delaram Golpayegani + Paul Ryan + Georg P. Krog + Delaram Golpayegani + Harshvardhan J. Pandit + Beatriz Esteves + Rob Brennan + Julian Flake + http://www.w3.org/2004/02/skos/core + + http://www.w3.org/2000/01/rdf-schema + + + + 10.5281/zenodo.12505841 + + + + + + + + + + + + + Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 + http://purl.org/ontology/bibo/status/published + 2022-08-14 + https://w3id.org/dpv/risk + Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management + 2.1-dev + + 2022-08-14 + + + RISK + risk + 2.1-dev + 2024-07-13 + Risk Concepts + https://w3id.org/dpv/risk# + + + https://www.iso.org/standard/75281.html + + ISO/IEC 27005:2018 + + + + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + Damage + Something that acts as or causes Damage + accepted + 2022-03-30 - Impact to Rights - This concept was called "ImpactToRights" in DPV 2.0 - - 2024-08-16 - - + + Harshvardhan J. Pandit + - - + + 2024-08-16 + - Something that acts as or causes Social Disadvantage - Social Disadvantage - 2022-08-19 - + Harshvardhan J. Pandit + accepted - Georg P. Krog - 2024-08-16 - + 2022-08-17 + + Unwanted Data Deletion + Something that acts as or causes Unwanted Data Deletion + + + - + - - accepted - Authorisation Failure - Harshvardhan J. Pandit - 2024-08-16 + Something that acts as or causes Phishing Scam + + accepted 2022-08-17 - Something that acts as or causes Authorisation Failure - + 2024-08-16 + Phishing Scam + Harshvardhan J. Pandit + + - - - + + + Harshvardhan J. Pandit + 2022-08-17 + Cryptojacking + + Something that acts as or causes Cryptojacking accepted 2024-08-16 - Something that acts as or causes Identity Fraud - Harshvardhan J. Pandit - Identity Fraud + + + + + Something that acts as or causes Injury + accepted 2022-08-17 - + + Harshvardhan J. Pandit + + + + + Injury + 2024-08-16 + - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - - - - - Primer for Data Privacy Vocabulary - - - - - Things that cause or have the potential to impact financial resources + + accepted + 2022-08-17 + + + + Unauthorised System Access + 2024-08-16 + + Harshvardhan J. Pandit + Something that acts as or causes Unauthorised System Access + + + + + + + Blackmail + Harshvardhan J. Pandit accepted - Financial Impact - + 2022-08-17 + Something that acts as or causes Blackmail + + 2024-08-16 + + - - + + Something that acts as or causes Unauthorised Code Access + + 2024-08-16 2022-08-17 - Financial Loss - Harshvardhan J. Pandit - Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity accepted + Unauthorised Code Access + + + + + + accepted + + 2024-04-14 + + + + Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + Reward + 2024-08-16 + Georg P. Krog, Harshvardhan J. Pandit - + Environmental Risk + Risks and issues that have their origin in environment or can affect the environment at large accepted - Environmental Risk - - Harshvardhan J. Pandit - accepted + + Copyright Violation + Something that acts as or causes Copyright Violation - Re-identification + accepted + 2022-08-17 + + Harshvardhan J. Pandit + 2024-08-16 - Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification - 2022-08-19 + + + + + + + Something that involves or causes judicial costs to be paid - Something that acts as or causes Re-identification - + Judicial Costs + accepted + - - Coercion + + Unauthorised System Modification + - + Something that acts as or causes Unauthorised System Modification + 2024-08-16 + Harshvardhan J. Pandit accepted - Something that acts as or causes Coercion - 2024-08-16 2022-08-17 - + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - Cryptojacking - Harshvardhan J. Pandit - Something that acts as or causes Cryptojacking - + Georg P. Krog, Harshvardhan J. Pandit + Violation of Rights + 2022-08-18 + This concept was called "ViolationOfRights" in DPV 2.0 + Something that acts as or causes Violation of Rights accepted 2024-08-16 + + + + + + + Unauthorised Data Access + Something that acts as or causes Unauthorised Data Access + 2024-08-16 + + + Harshvardhan J. Pandit + accepted 2022-08-17 + - - ENISA Reference Incident Classification Taxonomy 2018 - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + + accepted + Concepts associated with security threats that are likely to originate externally + + External Security Threat + - + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - - Equipment Failure + + https://www.iso.org/standard/75281.html + + ISO/IEC 27005:2018 + + + Individual Health & Safety - - - Harshvardhan J. Pandit - Here equipment refers to physical equipment - 2024-08-16 - 2022-08-17 accepted - Something that acts as or causes Equipment Failure - + + - - 2022-08-17 - - + + Something that acts as or causes Fraud + accepted + 2024-08-16 - Harshvardhan J. Pandit - Denial of Service Attack (DoS) - Something that acts as or causes Denial of Service Attack (DoS) - 2024-08-16 - accepted + Harshvardhan J. Pandit + Fraud + + 2022-08-17 + - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - + Harshvardhan J. Pandit - + + Public Order Breach + + - 2022-03-30 - Non-Material Damage - - Something that acts as or causes Non-Material Damage - 2024-08-16 - The criteria for what is considered material damage is based in jurisdictional laws and norms accepted + Something that acts as or causes Public Order Breach + 2022-08-17 + 2024-08-16 - - - Something that acts as or causes benefits + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + + - Benefit + + Something that acts as or causes Illegal Processing of Data + Illegal Data Processing 2024-08-16 - 2022-03-23 accepted - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres - + 2022-08-17 + + Harshvardhan J. Pandit + This concept was called "IllegalProcessingData" in DPV 2.0 + - - Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + accepted + Risks and issues that have their basis in legal requirements and enforcement - 2024-08-16 + Legal Risk - accepted - Reward - 2024-04-14 - Georg P. Krog, Harshvardhan J. Pandit - + - - ENISA Threat Landscape 2021 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 - - Judicial Costs - - - - - accepted - Something that involves or causes judicial costs to be paid - + + https://www.iso.org/standard/75281.html + + ISO/IEC 27005:2018 - - Georg P. Krog, Harshvardhan J. Pandit - Something that acts as or provides payment e.g. to access a service or purchase resources + accepted + 2022-08-17 + 2024-08-16 - 2024-08-16 - 2024-04-14 - Payment - + Harshvardhan J. Pandit + + Personal Safety Endangerment + Something that acts as or causes Personal Safety Endangerment + - - Concepts associated with security threats that are likely to originate externally + + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ENISA Methodology for Sectoral Cybersecurity Assessments + + + + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + + + + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + + https://www.iso.org/standard/75281.html + + ISO/IEC 27005:2018 + + accepted - + + Something that acts as or causes violation of policy which can be either internal or external policy - External Security Threat - + Violating Policy + - + - 2024-04-14 - - Something that acts as or provides renumeration which is in monetary or financial form - 2024-08-16 - Georg P. Krog, Harshvardhan J. Pandit accepted - Remuneration - + Risks and issues that affect or have the potential to affect society at large or specific groups in society + Societal Risk + + - - + + accepted + 2024-08-16 + - Security Attack - Something that acts as or causes an attack on security with the aim of undermining it - accepted + Harshvardhan J. Pandit + + 2022-08-17 + Something that acts as or causes Extorsion + Extorsion + - - - - - - Risk Concepts - JSON-LD serialiation - - - - + + - 2024-08-16 - 2022-08-17 - Something that acts as or causes Unwanted Disclosure of Data - Unwanted Disclosure of Data - Harshvardhan J. Pandit - accepted - - - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - ENISA Methodology for Sectoral Cybersecurity Assessments - - - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 + + - - + + Impact to Rights + - 2024-08-16 + accepted 2022-08-17 - accepted - Something that acts as or causes Loss of Credibility - - Lose of Credibility Harshvardhan J. Pandit - + This concept was called "ImpactToRights" in DPV 2.0 + Something that acts as or causes Impact to Rights + + 2024-08-16 + + - - This concept was called "InterceptionCommunications" in DPV 2.0 - - Harshvardhan J. Pandit - Something that acts as or causes Interception of Communications + 2022-08-17 - + 2024-08-16 + modified + This concept was called "Corruption Data" in DPV 2.0 - modified - Intercept Communications - 2024-08-16 - + Data Corruption + + Something that acts as or causes Corruption of Data + Harshvardhan J. Pandit + + + - - 2024-08-16 - + + - 2022-08-17 - - Something that acts as or causes Unwanted Code Deletion - Unwanted Code Deletion - Harshvardhan J. Pandit + Privacy accepted - + - - + + The criteria for what is considered material damage is based in jurisdictional laws and norms + Something that acts as or causes Material Damage accepted + 2024-08-16 - Concepts associated with risks that arise due to User or Human use - User Risks - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - + 2022-03-30 + Material Damage + Harshvardhan J. Pandit + + + + Harm + This concept refers to the general abstract notion of harm + Something that acts as or causes Harm to humans + 2024-08-16 + + Harshvardhan J. Pandit + 2022-08-13 accepted - Judicial Penalty - Something that involves or causes judicial penalties to be paid - + - - + + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 + + + Something that acts as or causes Erroneous System Use + accepted + 2022-08-17 + 2024-08-16 + - 2024-08-16 - 2022-08-17 - - Something that acts as or causes Extorsion Harshvardhan J. Pandit - accepted - Extorsion - + + Erroneous System Use + - - 2022-08-13 - Harshvardhan J. Pandit + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + accepted + Something that acts as or causes Loss of Opportunity + 2024-08-16 - Something that acts as or causes Harm to humans - 2024-08-16 - Harm - This concept refers to the general abstract notion of harm - + Harshvardhan J. Pandit + Lose of Opportunity + + 2022-08-17 + - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - Something that acts as or causes Discrimination - accepted - Georg P. Krog - 2024-08-16 - 2022-08-19 - Discrimination + Societal Health & Safety + accepted - + - Something that acts as or causes violation of policy which can be either internal or external policy - + Georg P. Krog, Harshvardhan J. Pandit accepted - Violating Policy - + This concept was called "PreventExercisingOfRights" in DPV 2.0 + 2024-08-16 + + Something that acts as or causes Prevent Exercising of Rights + 2022-08-18 + Prevent Exercising of Rights + - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + - - - https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 - - Harshvardhan J. Pandit + + + + + + accepted + Operational Security Risk + Risks and issues that arise during operational processes + + + - Something that acts as or causes Scam 2024-08-16 + Something that acts as or causes Coercion + + Coercion + + Harshvardhan J. Pandit accepted 2022-08-17 - Scam - - + - + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ ENISA Reference Incident Classification Taxonomy 2018 - - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ ENISA Reference Incident Classification Taxonomy 2018 + - - Something that acts as or causes Equipment Malfunction - Equipment Malfunction + - Here equipment refers to physical equipment - - - Harshvardhan J. Pandit - accepted - 2024-08-16 - 2022-08-17 - - - - Harshvardhan J. Pandit - Damage + Compensation + Something that acts as or provides compensation - which can be monetary and financial or in other forms accepted - - - 2024-08-16 + Georg P. Krog, Harshvardhan J. Pandit - 2022-03-30 - Something that acts as or causes Damage - + 2024-04-14 + - - Harshvardhan J. Pandit - - accepted - 2022-08-17 - - - - - Something that acts as or causes Copyright Violation - 2024-08-16 - Copyright Violation - + + + + + + + Risk Concepts - JSON-LD serialiation - - + - - Unauthorised Re-Identification - 2022-08-19 - Something that acts as or causes Unauthorised Re-Identification - - Georg P. Krog - 2024-08-16 - accepted - - - - Something that acts as or causes Unauthorised Data Disclosure - Harshvardhan J. Pandit - Unauthorised Data Disclosure - - - 2024-08-16 - + Unauthorised Resource Use accepted + Something that acts as or causes Unauthorised Resource Use + + 2024-08-16 2022-08-17 + + Harshvardhan J. Pandit + - + - Physical Harm - - accepted - - - + Something that acts as or causes Loss of Customer Confidence + Lose of Customer Confidence 2024-08-16 + 2022-08-17 - - - - - Something that acts as or causes Unauthorised System Access - Unauthorised System Access Harshvardhan J. Pandit accepted - - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 + - - - https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - - Risk Concepts - Turtle serialiation - - - - - - - - - - - Individual Health & Safety - accepted - - - - ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - Legal Risk - accepted + + accepted - Risks and issues that have their basis in legal requirements and enforcement + Financial Impact + Things that cause or have the potential to impact financial resources - - - - - Sabotage - - Something that acts as or causes Sabotage - 2024-08-16 - Harshvardhan J. Pandit + + accepted - 2022-08-17 - - - - accepted + 2024-08-16 - Harshvardhan J. Pandit - 2022-08-17 + Something that acts as or causes Confidentiality Breach + Confidentiality Breach - - 2024-08-16 - Something that acts as or causes Unauthorised Code Access - Unauthorised Code Access - + Harshvardhan J. Pandit + + + + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - + + + Here system refers to both hardware and software systems accepted - Reputational Risk + 2024-08-16 + System Malfunction + + 2022-08-17 - Risks and issues that affect the reputation of the organisation - + Harshvardhan J. Pandit + Something that acts as or causes System Malfunction + + - + https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + ISO/IEC 27005:2018 - - accepted - - - - Risks and issues that arise during operational processes - - Operational Security Risk - + + Risk Concepts - Turtle serialiation + + + + + - + + Primer for Data Privacy Vocabulary + + + + + + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - + + Something that acts as or causes Discrimination + 2022-08-19 + - 2024-08-16 - System Intrusion - Something that acts as or causes System Intrusion - accepted - Harshvardhan J. Pandit - 2022-08-17 - + accepted + Discrimination + Georg P. Krog + - - - - Risk Concepts - N3 serialiation - - - + + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 + + + https://www.iso.org/standard/75281.html + + ISO/IEC 27005:2018 Unauthorised Activity + accepted Something that acts as or causes Unauthorised Activity - accepted + + + - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 - + + ENISA Threat Landscape 2021 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 + + + + + Risk Concepts - N3 serialiation + - - - Risk Concepts - RDF/XML serialiation - - - - https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 + - - 2022-08-17 - - - - - - Harshvardhan J. Pandit - Something that acts as or causes Unauthorised Data Access - Unauthorised Data Access - 2024-08-16 + accepted - - - - Georg P. Krog, Harshvardhan J. Pandit - This concept was called "LimitationOfRights" in DPV 2.0 - Something that acts as or causes Limitation of Rights - + - Limitation of Rights - 2022-08-18 - 2024-08-16 + User Risks - accepted - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + Concepts associated with risks that arise due to User or Human use + - - ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - + + + + + + Examples for Data Privacy Vocabulary + - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + - - https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 - - https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - - - ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + + https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks ENISA Threat Landscape for Ransomware Attacks 2022 - + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + ENISA Reference Incident Classification Taxonomy 2018 - - ISO/IEC 27005:2018 + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - ENISA Methodology for Sectoral Cybersecurity Assessments - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - ENISA Threat Taxonomy 2016 + + https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + ENISA Threat Landscape for Ransomware Attacks 2022 - + https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 - - - https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - ENISA Reference Incident Classification Taxonomy 2018 + + accepted + + + + Physical Harm + + - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + - ENISA Reference Incident Classification Taxonomy 2018 + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + - ENISA Reference Incident Classification Taxonomy 2018 + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 - ENISa Trust Services Security Incidents 2021 - - + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - + - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - accepted - Intentional Misuse - - - - - Intentional Misuse - + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - + + + + + + + Guides for Data Privacy Vocabulary - - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - ENISA Threat Taxonomy 2016 + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - + Risk Concepts - HTML serialiation - + + - + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment ENISA Methodology for Sectoral Cybersecurity Assessments - + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - ENISA Methodology for Sectoral Cybersecurity Assessments https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ENISA Methodology for Sectoral Cybersecurity Assessments - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ENISA Methodology for Sectoral Cybersecurity Assessments diff --git a/2.1-dev/risk/modules/risk_consequences-owl.ttl b/2.1-dev/risk/modules/risk_consequences-owl.ttl index 100050053..1fdb2d194 100644 --- a/2.1-dev/risk/modules/risk_consequences-owl.ttl +++ b/2.1-dev/risk/modules/risk_consequences-owl.ttl @@ -34,7 +34,9 @@ risk-owl:AuthorisationFailure a rdfs:Class, schema:name "ENISa Trust Services Security Incidents 2021" ; schema:url "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Authorisation Failure"@en ; skos:prefLabel "Authorisation Failure"@en . @@ -43,7 +45,8 @@ risk-owl:AvailabilityBreach a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:DataBreach ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:DataBreach ; sw:term_status "accepted"@en . risk-owl:Benefit a rdfs:Class, @@ -68,7 +71,8 @@ risk-owl:Blackmail a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Blackmail"@en ; skos:prefLabel "Blackmail"@en . @@ -83,7 +87,9 @@ risk-owl:BruteForceAuthorisations a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; skos:prefLabel "Brute Force Authorisations"@en . @@ -98,7 +104,8 @@ risk-owl:Coercion a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Coercion"@en ; skos:prefLabel "Coercion"@en . @@ -119,7 +126,8 @@ risk-owl:ComponentFailure a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Component Failure"@en ; skos:prefLabel "Component Failure"@en ; @@ -129,7 +137,8 @@ risk-owl:ComponentMalfunction a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Component Malfunction"@en ; skos:prefLabel "Component Malfunction"@en ; @@ -145,7 +154,10 @@ risk-owl:CompromiseAccount a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ; skos:prefLabel "Compromise Account"@en . @@ -160,7 +172,8 @@ risk-owl:CompromiseAccountCredentials a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ; skos:prefLabel "Compromise Account Credentials"@en . @@ -175,7 +188,8 @@ risk-owl:ConfidentialityBreach a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:DataBreach ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:DataBreach ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Confidentiality Breach"@en ; skos:prefLabel "Confidentiality Breach"@en . @@ -205,7 +219,8 @@ risk-owl:Cryptojacking a rdfs:Class, schema:name "ENISA Threat Landscape 2021" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Cryptojacking"@en ; skos:prefLabel "Cryptojacking"@en . @@ -234,7 +249,10 @@ risk-owl:DataBreach a rdfs:Class, vann:example dex-owl:E0069, dex-owl:E0071 ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SecurityBreach ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:SecurityBreach ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Data Breach"@en ; skos:prefLabel "Data Breach"@en . @@ -249,7 +267,8 @@ risk-owl:DataCorruption a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:IntegrityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Corruption of Data"@en ; skos:prefLabel "Data Corruption"@en ; @@ -262,13 +281,11 @@ risk-owl:DenialServiceAttack a rdfs:Class, dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ], - [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ; skos:prefLabel "Denial of Service Attack (DoS)"@en . @@ -307,7 +324,8 @@ risk-owl:DistributedDenialServiceAttack a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ; skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en . @@ -331,7 +349,8 @@ risk-owl:EquipmentFailure a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Equipment Failure"@en ; skos:prefLabel "Equipment Failure"@en ; @@ -347,7 +366,8 @@ risk-owl:EquipmentMalfunction a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Equipment Malfunction"@en ; skos:prefLabel "Equipment Malfunction"@en ; @@ -403,7 +423,8 @@ risk-owl:Extorsion a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Extorsion"@en ; skos:prefLabel "Extorsion"@en . @@ -455,7 +476,8 @@ risk-owl:Fraud a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Fraud"@en ; skos:prefLabel "Fraud"@en . @@ -498,7 +520,8 @@ risk-owl:IdentityFraud a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Identity Fraud"@en ; skos:prefLabel "Identity Fraud"@en . @@ -513,7 +536,8 @@ risk-owl:IdentityTheft a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Identity Theft"@en ; skos:prefLabel "Identity Theft"@en . @@ -568,7 +592,8 @@ risk-owl:IntegrityBreach a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:DataBreach ; + rdfs:subClassOf risk-owl:DataBreach, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en . risk-owl:IntentionalMisuse a rdfs:Class, @@ -590,21 +615,13 @@ risk-owl:InterceptCommunications a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Interception of Communications"@en ; skos:prefLabel "Intercept Communications"@en ; skos:scopeNote "This concept was called \"InterceptionCommunications\" in DPV 2.0"@en . -risk-owl:InternalSecurityThreat a rdfs:Class, - owl:Class, - dpv-owl:RiskConcept ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:RiskConcept ; - sw:term_status "accepted"@en ; - skos:definition "Concepts associated with security threats and issues that originate within the organisation"@en ; - skos:prefLabel "Internal Security Threat"@en . - risk-owl:JudicialCosts a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; @@ -747,7 +764,10 @@ risk-owl:MaliciousCodeAttack a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Malicious Code Attack"@en ; skos:prefLabel "Malicious Code Attack"@en . @@ -762,7 +782,10 @@ risk-owl:MalwareAttack a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Malware Attack"@en ; skos:prefLabel "Malware Attack"@en . @@ -851,7 +874,8 @@ risk-owl:PhishingScam a rdfs:Class, schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Phishing Scam"@en ; skos:prefLabel "Phishing Scam"@en . @@ -924,7 +948,8 @@ risk-owl:Reidentification a rdfs:Class, dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Re-identification"@en ; skos:prefLabel "Re-identification"@en ; @@ -1029,7 +1054,9 @@ risk-owl:Sabotage a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Sabotage"@en ; skos:prefLabel "Sabotage"@en . @@ -1044,7 +1071,8 @@ risk-owl:Scam a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Scam"@en ; skos:prefLabel "Scam"@en . @@ -1053,7 +1081,10 @@ risk-owl:SecurityAttack a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ; skos:prefLabel "Security Attack"@en . @@ -1068,7 +1099,10 @@ risk-owl:SecurityBreach a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Security Breach"@en ; skos:prefLabel "Security Breach"@en . @@ -1130,7 +1164,9 @@ risk-owl:Spoofing a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat, + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept, risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Spoofing"@en ; @@ -1146,7 +1182,8 @@ risk-owl:SystemFailure a rdfs:Class, schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes System Failure"@en ; skos:prefLabel "System Failure"@en ; @@ -1162,7 +1199,10 @@ risk-owl:SystemIntrusion a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes System Intrusion"@en ; skos:prefLabel "System Intrusion"@en . @@ -1177,7 +1217,8 @@ risk-owl:SystemMalfunction a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes System Malfunction"@en ; skos:prefLabel "System Malfunction"@en ; @@ -1208,7 +1249,10 @@ risk-owl:UnauthorisedAccesstoPremises a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ; skos:prefLabel "Unauthorised Access to Premises"@en . @@ -1217,7 +1261,10 @@ risk-owl:UnauthorisedActivity a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Activity"@en ; skos:prefLabel "Unauthorised Activity"@en . @@ -1232,7 +1279,9 @@ risk-owl:UnauthorisedCodeAccess a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Code Access"@en ; skos:prefLabel "Unauthorised Code Access"@en . @@ -1247,7 +1296,8 @@ risk-owl:UnauthorisedCodeDisclosure a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ; skos:prefLabel "Unauthorised Code Disclosure"@en . @@ -1262,7 +1312,8 @@ risk-owl:UnauthorisedCodeModification a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ; skos:prefLabel "Unauthorised Code Modification"@en . @@ -1277,7 +1328,8 @@ risk-owl:UnauthorisedDataAccess a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Data Access"@en ; skos:prefLabel "Unauthorised Data Access"@en . @@ -1292,7 +1344,8 @@ risk-owl:UnauthorisedDataDisclosure a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ; skos:prefLabel "Unauthorised Data Disclosure"@en . @@ -1307,7 +1360,8 @@ risk-owl:UnauthorisedDataModification a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ; skos:prefLabel "Unauthorised Data Modification"@en . @@ -1322,7 +1376,8 @@ risk-owl:UnauthorisedInformationDisclosure a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ; skos:prefLabel "Unauthorised Information Disclosure"@en . @@ -1334,7 +1389,8 @@ risk-owl:UnauthorisedReidentification a rdfs:Class, dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ; skos:prefLabel "Unauthorised Re-Identification"@en . @@ -1349,7 +1405,8 @@ risk-owl:UnauthorisedResourceUse a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ; skos:prefLabel "Unauthorised Resource Use"@en . @@ -1364,7 +1421,9 @@ risk-owl:UnauthorisedSystemAccess a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised System Access"@en ; skos:prefLabel "Unauthorised System Access"@en . @@ -1379,7 +1438,8 @@ risk-owl:UnauthorisedSystemModification a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised System Modification"@en ; skos:prefLabel "Unauthorised System Modification"@en . @@ -1394,7 +1454,9 @@ risk-owl:UnwantedCodeDeletion a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ; skos:prefLabel "Unwanted Code Deletion"@en . @@ -1409,7 +1471,9 @@ risk-owl:UnwantedDataDeletion a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ; skos:prefLabel "Unwanted Data Deletion"@en . @@ -1424,7 +1488,8 @@ risk-owl:UnwantedDisclosureData a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ; skos:prefLabel "Unwanted Disclosure of Data"@en . @@ -1543,21 +1608,6 @@ risk-owl:ViolenceAgainstChildren a rdfs:Class, skos:prefLabel "Violence against children"@en ; skos:scopeNote "This concept was called \"ChildViolence\" in DPV 2.0"@en . -risk-owl:VulnerabilityCreated a rdfs:Class, - owl:Class, - dpv-owl:RiskConcept ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:modified "2024-08-16"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:InternalSecurityThreat ; - sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Vulnerability Created"@en ; - skos:prefLabel "Vulnerability Created"@en . - risk-owl:serialisation-html a profile:ResourceDescriptor ; dct:conformsTo ; dct:format ; diff --git a/2.1-dev/risk/modules/risk_consequences.csv b/2.1-dev/risk/modules/risk_consequences.csv index f928036db..8d54ca551 100644 --- a/2.1-dev/risk/modules/risk_consequences.csv +++ b/2.1-dev/risk/modules/risk_consequences.csv @@ -1,47 +1,46 @@ term,type,iri,label,definition,dpvtype,subclassof,hasbroader,scopenote,created,modified,vocab,namespace AccidentalMisuse,class,https://w3id.org/dpv/risk#AccidentalMisuse,Accidental Misuse,Accidental Misuse,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,,,risk,https://w3id.org/dpv/risk -AuthorisationFailure,class,https://w3id.org/dpv/risk#AuthorisationFailure,Authorisation Failure,Something that acts as or causes Authorisation Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +AuthorisationFailure,class,https://w3id.org/dpv/risk#AuthorisationFailure,Authorisation Failure,Something that acts as or causes Authorisation Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk Benefit,class,https://w3id.org/dpv/risk#Benefit,Benefit,Something that acts as or causes benefits,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2022-03-23,2024-08-16,risk,https://w3id.org/dpv/risk -Blackmail,class,https://w3id.org/dpv/risk#Blackmail,Blackmail,Something that acts as or causes Blackmail,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -BruteForceAuthorisations,class,https://w3id.org/dpv/risk#BruteForceAuthorisations,Brute Force Authorisations,Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -Coercion,class,https://w3id.org/dpv/risk#Coercion,Coercion,Something that acts as or causes Coercion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Blackmail,class,https://w3id.org/dpv/risk#Blackmail,Blackmail,Something that acts as or causes Blackmail,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +BruteForceAuthorisations,class,https://w3id.org/dpv/risk#BruteForceAuthorisations,Brute Force Authorisations,Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Coercion,class,https://w3id.org/dpv/risk#Coercion,Coercion,Something that acts as or causes Coercion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk Compensation,class,https://w3id.org/dpv/risk#Compensation,Compensation,Something that acts as or provides compensation - which can be monetary and financial or in other forms,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk -ComponentFailure,class,https://w3id.org/dpv/risk#ComponentFailure,Component Failure,Something that acts as or causes Component Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk -ComponentMalfunction,class,https://w3id.org/dpv/risk#ComponentMalfunction,Component Malfunction,Something that acts as or causes Component Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk -CompromiseAccount,class,https://w3id.org/dpv/risk#CompromiseAccount,Compromise Account,Something that acts as or causes a compromised account that is then used by the compromiser,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -CompromiseAccountCredentials,class,https://w3id.org/dpv/risk#CompromiseAccountCredentials,Compromise Account Credentials,Something that acts as or causes Account Credentials to be compromised,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -ConfidentialityBreach,class,https://w3id.org/dpv/risk#ConfidentialityBreach,Confidentiality Breach,Something that acts as or causes Confidentiality Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#DataBreach,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ComponentFailure,class,https://w3id.org/dpv/risk#ComponentFailure,Component Failure,Something that acts as or causes Component Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk +ComponentMalfunction,class,https://w3id.org/dpv/risk#ComponentMalfunction,Component Malfunction,Something that acts as or causes Component Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk +CompromiseAccount,class,https://w3id.org/dpv/risk#CompromiseAccount,Compromise Account,Something that acts as or causes a compromised account that is then used by the compromiser,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +CompromiseAccountCredentials,class,https://w3id.org/dpv/risk#CompromiseAccountCredentials,Compromise Account Credentials,Something that acts as or causes Account Credentials to be compromised,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ConfidentialityBreach,class,https://w3id.org/dpv/risk#ConfidentialityBreach,Confidentiality Breach,Something that acts as or causes Confidentiality Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#DataBreach,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk CopyrightViolation,class,https://w3id.org/dpv/risk#CopyrightViolation,Copyright Violation,Something that acts as or causes Copyright Violation,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -Cryptojacking,class,https://w3id.org/dpv/risk#Cryptojacking,Cryptojacking,Something that acts as or causes Cryptojacking,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Cryptojacking,class,https://w3id.org/dpv/risk#Cryptojacking,Cryptojacking,Something that acts as or causes Cryptojacking,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk Damage,class,https://w3id.org/dpv/risk#Damage,Damage,Something that acts as or causes Damage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk -DataBreach,class,https://w3id.org/dpv/risk#DataBreach,Data Breach,Something that acts as or causes Data Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SecurityBreach,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -DataCorruption,class,https://w3id.org/dpv/risk#DataCorruption,Data Corruption,Something that acts as or causes Corruption of Data,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,"This concept was called ""Corruption Data"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -DenialServiceAttack,class,https://w3id.org/dpv/risk#DenialServiceAttack,Denial of Service Attack (DoS),Something that acts as or causes Denial of Service Attack (DoS),https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +DataBreach,class,https://w3id.org/dpv/risk#DataBreach,Data Breach,Something that acts as or causes Data Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#SecurityBreach,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +DataCorruption,class,https://w3id.org/dpv/risk#DataCorruption,Data Corruption,Something that acts as or causes Corruption of Data,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,"This concept was called ""Corruption Data"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +DenialServiceAttack,class,https://w3id.org/dpv/risk#DenialServiceAttack,Denial of Service Attack (DoS),Something that acts as or causes Denial of Service Attack (DoS),https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk Detriment,class,https://w3id.org/dpv/risk#Detriment,Detriment,Something that acts as or causes Detriment,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-03-23,2024-08-16,risk,https://w3id.org/dpv/risk Discrimination,class,https://w3id.org/dpv/risk#Discrimination,Discrimination,Something that acts as or causes Discrimination,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk -DistributedDenialServiceAttack,class,https://w3id.org/dpv/risk#DistributedDenialServiceAttack,Distributed Denial of Service Attack (DDoS),Something that acts as or causes Distributed Denial of Service Attack (DDoS),https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +DistributedDenialServiceAttack,class,https://w3id.org/dpv/risk#DistributedDenialServiceAttack,Distributed Denial of Service Attack (DDoS),Something that acts as or causes Distributed Denial of Service Attack (DDoS),https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk EnvironmentalRisk,class,https://w3id.org/dpv/risk#EnvironmentalRisk,Environmental Risk,Risks and issues that have their origin in environment or can affect the environment at large,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk -EquipmentFailure,class,https://w3id.org/dpv/risk#EquipmentFailure,Equipment Failure,Something that acts as or causes Equipment Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -EquipmentMalfunction,class,https://w3id.org/dpv/risk#EquipmentMalfunction,Equipment Malfunction,Something that acts as or causes Equipment Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +EquipmentFailure,class,https://w3id.org/dpv/risk#EquipmentFailure,Equipment Failure,Something that acts as or causes Equipment Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +EquipmentMalfunction,class,https://w3id.org/dpv/risk#EquipmentMalfunction,Equipment Malfunction,Something that acts as or causes Equipment Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ErroneousSystemUse,class,https://w3id.org/dpv/risk#ErroneousSystemUse,Erroneous System Use,Something that acts as or causes Erroneous System Use,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ExposureToHarmfulSpeech,class,https://w3id.org/dpv/risk#ExposureToHarmfulSpeech,Exposure to Harmful Speech,Something that acts as or causes Harmful Speech,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""HarmfulSpeech"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ExternalSecurityThreat,class,https://w3id.org/dpv/risk#ExternalSecurityThreat,External Security Threat,Concepts associated with security threats that are likely to originate externally,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk -Extorsion,class,https://w3id.org/dpv/risk#Extorsion,Extorsion,Something that acts as or causes Extorsion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Extorsion,class,https://w3id.org/dpv/risk#Extorsion,Extorsion,Something that acts as or causes Extorsion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk Fee,class,https://w3id.org/dpv/risk#Fee,Fee,Something that acts as or provides fees e.g. for using a service,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk FinancialImpact,class,https://w3id.org/dpv/risk#FinancialImpact,Financial Impact,Things that cause or have the potential to impact financial resources,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk FinancialLoss,class,https://w3id.org/dpv/risk#FinancialLoss,Financial Loss,Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -Fraud,class,https://w3id.org/dpv/risk#Fraud,Fraud,Something that acts as or causes Fraud,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Fraud,class,https://w3id.org/dpv/risk#Fraud,Fraud,Something that acts as or causes Fraud,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk Harm,class,https://w3id.org/dpv/risk#Harm,Harm,Something that acts as or causes Harm to humans,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,This concept refers to the general abstract notion of harm,2022-08-13,2024-08-16,risk,https://w3id.org/dpv/risk HumanErrors,class,https://w3id.org/dpv/risk#HumanErrors,Human Errors,Something that acts as or causes Human Errors,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -IdentityFraud,class,https://w3id.org/dpv/risk#IdentityFraud,Identity Fraud,Something that acts as or causes Identity Fraud,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -IdentityTheft,class,https://w3id.org/dpv/risk#IdentityTheft,Identity Theft,Something that acts as or causes Identity Theft,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +IdentityFraud,class,https://w3id.org/dpv/risk#IdentityFraud,Identity Fraud,Something that acts as or causes Identity Fraud,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +IdentityTheft,class,https://w3id.org/dpv/risk#IdentityTheft,Identity Theft,Something that acts as or causes Identity Theft,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk IllegalDataProcessing,class,https://w3id.org/dpv/risk#IllegalDataProcessing,Illegal Data Processing,Something that acts as or causes Illegal Processing of Data,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""IllegalProcessingData"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk IndividualHealthSafety,class,https://w3id.org/dpv/risk#IndividualHealthSafety,Individual Health & Safety,,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,,,risk,https://w3id.org/dpv/risk IndividualRisk,class,https://w3id.org/dpv/risk#IndividualRisk,Individual Risk,Risks and issues that affect or have the potential to affect specific individuals,,,,,,,risk,https://w3id.org/dpv/risk Injury,class,https://w3id.org/dpv/risk#Injury,Injury,Something that acts as or causes Injury,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk IntentionalMisuse,class,https://w3id.org/dpv/risk#IntentionalMisuse,Intentional Misuse,Intentional Misuse,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,,,risk,https://w3id.org/dpv/risk -InterceptCommunications,class,https://w3id.org/dpv/risk#InterceptCommunications,Intercept Communications,Something that acts as or causes Interception of Communications,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,"This concept was called ""InterceptionCommunications"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -InternalSecurityThreat,class,https://w3id.org/dpv/risk#InternalSecurityThreat,Internal Security Threat,Concepts associated with security threats and issues that originate within the organisation,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk +InterceptCommunications,class,https://w3id.org/dpv/risk#InterceptCommunications,Intercept Communications,Something that acts as or causes Interception of Communications,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,"This concept was called ""InterceptionCommunications"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk JudicialCosts,class,https://w3id.org/dpv/risk#JudicialCosts,Judicial Costs,Something that involves or causes judicial costs to be paid,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,,,risk,https://w3id.org/dpv/risk JudicialPenalty,class,https://w3id.org/dpv/risk#JudicialPenalty,Judicial Penalty,Something that involves or causes judicial penalties to be paid,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,,,risk,https://w3id.org/dpv/risk LegalRisk,class,https://w3id.org/dpv/risk#LegalRisk,Legal Risk,Risks and issues that have their basis in legal requirements and enforcement,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk @@ -52,21 +51,21 @@ LoseNegotiatingCapacity,class,https://w3id.org/dpv/risk#LoseNegotiatingCapacity, LoseOpportunity,class,https://w3id.org/dpv/risk#LoseOpportunity,Lose of Opportunity,Something that acts as or causes Loss of Opportunity,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk LoseReputation,class,https://w3id.org/dpv/risk#LoseReputation,Lose of Reputation,Something that acts as or causes Loss of Reputation,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk LoseTrust,class,https://w3id.org/dpv/risk#LoseTrust,Lose of Trust,Something that acts as or causes Loss of Trust,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -MaliciousCodeAttack,class,https://w3id.org/dpv/risk#MaliciousCodeAttack,Malicious Code Attack,Something that acts as or causes Malicious Code Attack,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -MalwareAttack,class,https://w3id.org/dpv/risk#MalwareAttack,Malware Attack,Something that acts as or causes Malware Attack,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +MaliciousCodeAttack,class,https://w3id.org/dpv/risk#MaliciousCodeAttack,Malicious Code Attack,Something that acts as or causes Malicious Code Attack,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +MalwareAttack,class,https://w3id.org/dpv/risk#MalwareAttack,Malware Attack,Something that acts as or causes Malware Attack,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk MaterialDamage,class,https://w3id.org/dpv/risk#MaterialDamage,Material Damage,Something that acts as or causes Material Damage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,The criteria for what is considered material damage is based in jurisdictional laws and norms,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk Misuse,class,https://w3id.org/dpv/risk#Misuse,Misuse,Something that acts as or causes Misuse,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,2024-06-11,2024-08-16,risk,https://w3id.org/dpv/risk NonMaterialDamage,class,https://w3id.org/dpv/risk#NonMaterialDamage,Non-Material Damage,Something that acts as or causes Non-Material Damage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,The criteria for what is considered material damage is based in jurisdictional laws and norms,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk OperationalSecurityRisk,class,https://w3id.org/dpv/risk#OperationalSecurityRisk,Operational Security Risk,Risks and issues that arise during operational processes,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk Payment,class,https://w3id.org/dpv/risk#Payment,Payment,Something that acts as or provides payment e.g. to access a service or purchase resources,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk PersonalSafetyEndangerment,class,https://w3id.org/dpv/risk#PersonalSafetyEndangerment,Personal Safety Endangerment,Something that acts as or causes Personal Safety Endangerment,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -PhishingScam,class,https://w3id.org/dpv/risk#PhishingScam,Phishing Scam,Something that acts as or causes Phishing Scam,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +PhishingScam,class,https://w3id.org/dpv/risk#PhishingScam,Phishing Scam,Something that acts as or causes Phishing Scam,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk PhysicalAssault,class,https://w3id.org/dpv/risk#PhysicalAssault,Physical Assault,Something that acts as or causes Physical Assault,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk PhysicalHarm,class,https://w3id.org/dpv/risk#PhysicalHarm,Physical Harm,,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,,,risk,https://w3id.org/dpv/risk Privacy,class,https://w3id.org/dpv/risk#Privacy,Privacy,,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,,,risk,https://w3id.org/dpv/risk PsychologicalHarm,class,https://w3id.org/dpv/risk#PsychologicalHarm,Psychological Harm,Something that acts as or causes Psychological Harm,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk PublicOrderBreach,class,https://w3id.org/dpv/risk#PublicOrderBreach,Public Order Breach,Something that acts as or causes Public Order Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -Reidentification,class,https://w3id.org/dpv/risk#Reidentification,Re-identification,Something that acts as or causes Re-identification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk +Reidentification,class,https://w3id.org/dpv/risk#Reidentification,Re-identification,Something that acts as or causes Re-identification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk Renumeration,class,https://w3id.org/dpv/risk#Renumeration,Remuneration,Something that acts as or provides renumeration which is in monetary or financial form,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk ReputationalRisk,class,https://w3id.org/dpv/risk#ReputationalRisk,Reputational Risk,Risks and issues that affect the reputation of the organisation,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk Reward,class,https://w3id.org/dpv/risk#Reward,Reward,Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk @@ -74,35 +73,35 @@ RightsExercisePrevention,class,https://w3id.org/dpv/risk#RightsExercisePreventio RightsImpact,class,https://w3id.org/dpv/risk#RightsImpact,Impact to Rights,Something that acts as or causes Impact to Rights,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#Impact;https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""ImpactToRights"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk RightsLimitation,class,https://w3id.org/dpv/risk#RightsLimitation,Limitation of Rights,Something that acts as or causes Limitation of Rights,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""LimitationOfRights"" in DPV 2.0",2022-08-18,2024-08-16,risk,https://w3id.org/dpv/risk RightsViolation,class,https://w3id.org/dpv/risk#RightsViolation,Violation of Rights,Something that acts as or causes Violation of Rights,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""ViolationOfRights"" in DPV 2.0",2022-08-18,2024-08-16,risk,https://w3id.org/dpv/risk -Sabotage,class,https://w3id.org/dpv/risk#Sabotage,Sabotage,Something that acts as or causes Sabotage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -Scam,class,https://w3id.org/dpv/risk#Scam,Scam,Something that acts as or causes Scam,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -SecurityAttack,class,https://w3id.org/dpv/risk#SecurityAttack,Security Attack,Something that acts as or causes an attack on security with the aim of undermining it,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk -SecurityBreach,class,https://w3id.org/dpv/risk#SecurityBreach,Security Breach,Something that acts as or causes Security Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Sabotage,class,https://w3id.org/dpv/risk#Sabotage,Sabotage,Something that acts as or causes Sabotage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Scam,class,https://w3id.org/dpv/risk#Scam,Scam,Something that acts as or causes Scam,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SecurityAttack,class,https://w3id.org/dpv/risk#SecurityAttack,Security Attack,Something that acts as or causes an attack on security with the aim of undermining it,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk +SecurityBreach,class,https://w3id.org/dpv/risk#SecurityBreach,Security Breach,Something that acts as or causes Security Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk SexualViolence,class,https://w3id.org/dpv/risk#SexualViolence,Sexual Violence,Something that acts as or causes Sexual Violence,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk SocialDisadvantage,class,https://w3id.org/dpv/risk#SocialDisadvantage,Social Disadvantage,Something that acts as or causes Social Disadvantage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk SocietalHealthSafety,class,https://w3id.org/dpv/risk#SocietalHealthSafety,Societal Health & Safety,,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,,,risk,https://w3id.org/dpv/risk SocietalRisk,class,https://w3id.org/dpv/risk#SocietalRisk,Societal Risk,Risks and issues that affect or have the potential to affect society at large or specific groups in society,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk -Spoofing,class,https://w3id.org/dpv/risk#Spoofing,Spoofing,Something that acts as or causes Spoofing,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -SystemFailure,class,https://w3id.org/dpv/risk#SystemFailure,System Failure,Something that acts as or causes System Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -SystemIntrusion,class,https://w3id.org/dpv/risk#SystemIntrusion,System Intrusion,Something that acts as or causes System Intrusion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -SystemMalfunction,class,https://w3id.org/dpv/risk#SystemMalfunction,System Malfunction,Something that acts as or causes System Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Spoofing,class,https://w3id.org/dpv/risk#Spoofing,Spoofing,Something that acts as or causes Spoofing,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SystemFailure,class,https://w3id.org/dpv/risk#SystemFailure,System Failure,Something that acts as or causes System Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SystemIntrusion,class,https://w3id.org/dpv/risk#SystemIntrusion,System Intrusion,Something that acts as or causes System Intrusion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SystemMalfunction,class,https://w3id.org/dpv/risk#SystemMalfunction,System Malfunction,Something that acts as or causes System Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk Terrorism,class,https://w3id.org/dpv/risk#Terrorism,Terrorism,Something that acts as or causes Terrorism,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedAccesstoPremises,class,https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises,Unauthorised Access to Premises,Something that acts as or causes Unauthorised Access to Premises,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedActivity,class,https://w3id.org/dpv/risk#UnauthorisedActivity,Unauthorised Activity,Something that acts as or causes Unauthorised Activity,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk -UnauthorisedCodeAccess,class,https://w3id.org/dpv/risk#UnauthorisedCodeAccess,Unauthorised Code Access,Something that acts as or causes Unauthorised Code Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedCodeDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure,Unauthorised Code Disclosure,Something that acts as or causes Unauthorised Code Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedCodeModification,class,https://w3id.org/dpv/risk#UnauthorisedCodeModification,Unauthorised Code Modification,Something that acts as or causes Unauthorised Code Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedDataAccess,class,https://w3id.org/dpv/risk#UnauthorisedDataAccess,Unauthorised Data Access,Something that acts as or causes Unauthorised Data Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedDataDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedDataDisclosure,Unauthorised Data Disclosure,Something that acts as or causes Unauthorised Data Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedDataModification,class,https://w3id.org/dpv/risk#UnauthorisedDataModification,Unauthorised Data Modification,Something that acts as or causes Unauthorised Data Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedInformationDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure,Unauthorised Information Disclosure,Something that acts as or causes Unauthorised Information Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedReidentification,class,https://w3id.org/dpv/risk#UnauthorisedReidentification,Unauthorised Re-Identification,Something that acts as or causes Unauthorised Re-Identification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedResourceUse,class,https://w3id.org/dpv/risk#UnauthorisedResourceUse,Unauthorised Resource Use,Something that acts as or causes Unauthorised Resource Use,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedSystemAccess,class,https://w3id.org/dpv/risk#UnauthorisedSystemAccess,Unauthorised System Access,Something that acts as or causes Unauthorised System Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedSystemModification,class,https://w3id.org/dpv/risk#UnauthorisedSystemModification,Unauthorised System Modification,Something that acts as or causes Unauthorised System Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnwantedCodeDeletion,class,https://w3id.org/dpv/risk#UnwantedCodeDeletion,Unwanted Code Deletion,Something that acts as or causes Unwanted Code Deletion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnwantedDataDeletion,class,https://w3id.org/dpv/risk#UnwantedDataDeletion,Unwanted Data Deletion,Something that acts as or causes Unwanted Data Deletion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnwantedDisclosureData,class,https://w3id.org/dpv/risk#UnwantedDisclosureData,Unwanted Disclosure of Data,Something that acts as or causes Unwanted Disclosure of Data,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedAccesstoPremises,class,https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises,Unauthorised Access to Premises,Something that acts as or causes Unauthorised Access to Premises,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedActivity,class,https://w3id.org/dpv/risk#UnauthorisedActivity,Unauthorised Activity,Something that acts as or causes Unauthorised Activity,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk +UnauthorisedCodeAccess,class,https://w3id.org/dpv/risk#UnauthorisedCodeAccess,Unauthorised Code Access,Something that acts as or causes Unauthorised Code Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedCodeDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure,Unauthorised Code Disclosure,Something that acts as or causes Unauthorised Code Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedCodeModification,class,https://w3id.org/dpv/risk#UnauthorisedCodeModification,Unauthorised Code Modification,Something that acts as or causes Unauthorised Code Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedDataAccess,class,https://w3id.org/dpv/risk#UnauthorisedDataAccess,Unauthorised Data Access,Something that acts as or causes Unauthorised Data Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedDataDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedDataDisclosure,Unauthorised Data Disclosure,Something that acts as or causes Unauthorised Data Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedDataModification,class,https://w3id.org/dpv/risk#UnauthorisedDataModification,Unauthorised Data Modification,Something that acts as or causes Unauthorised Data Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedInformationDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure,Unauthorised Information Disclosure,Something that acts as or causes Unauthorised Information Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedReidentification,class,https://w3id.org/dpv/risk#UnauthorisedReidentification,Unauthorised Re-Identification,Something that acts as or causes Unauthorised Re-Identification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedResourceUse,class,https://w3id.org/dpv/risk#UnauthorisedResourceUse,Unauthorised Resource Use,Something that acts as or causes Unauthorised Resource Use,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedSystemAccess,class,https://w3id.org/dpv/risk#UnauthorisedSystemAccess,Unauthorised System Access,Something that acts as or causes Unauthorised System Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedSystemModification,class,https://w3id.org/dpv/risk#UnauthorisedSystemModification,Unauthorised System Modification,Something that acts as or causes Unauthorised System Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnwantedCodeDeletion,class,https://w3id.org/dpv/risk#UnwantedCodeDeletion,Unwanted Code Deletion,Something that acts as or causes Unwanted Code Deletion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnwantedDataDeletion,class,https://w3id.org/dpv/risk#UnwantedDataDeletion,Unwanted Data Deletion,Something that acts as or causes Unwanted Data Deletion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnwantedDisclosureData,class,https://w3id.org/dpv/risk#UnwantedDisclosureData,Unwanted Disclosure of Data,Something that acts as or causes Unwanted Disclosure of Data,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk UserRisks,class,https://w3id.org/dpv/risk#UserRisks,User Risks,Concepts associated with risks that arise due to User or Human use,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk ViolatingCodeOfConduct,class,https://w3id.org/dpv/risk#ViolatingCodeOfConduct,Violating Code of Conduct,Something that acts as or causes Violation of Code of Conduct,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""ViolationCodeConduct"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ViolatingContractualObligation,class,https://w3id.org/dpv/risk#ViolatingContractualObligation,Violation of Contractual Obligation,Something that acts as or causes Violation of Contractual Obligations,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""ViolationContractualObligations"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk @@ -111,4 +110,3 @@ ViolatingLegalObligation,class,https://w3id.org/dpv/risk#ViolatingLegalObligatio ViolatingPolicy,class,https://w3id.org/dpv/risk#ViolatingPolicy,Violating Policy,Something that acts as or causes violation of policy which can be either internal or external policy,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,,,risk,https://w3id.org/dpv/risk ViolatingStatutoryObligations,class,https://w3id.org/dpv/risk#ViolatingStatutoryObligations,Violation of Statutory Obligations,Something that acts as or causes Violation of Statutory Obligations,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""ViolationStatutoryObligations"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ViolenceAgainstChildren,class,https://w3id.org/dpv/risk#ViolenceAgainstChildren,Violence against children,Something that acts as or causes Child Violence,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,"This concept was called ""ChildViolence"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -VulnerabilityCreated,class,https://w3id.org/dpv/risk#VulnerabilityCreated,Vulnerability Created,Something that acts as or causes Vulnerability Created,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#InternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk diff --git a/2.1-dev/risk/modules/risk_consequences.jsonld b/2.1-dev/risk/modules/risk_consequences.jsonld index cae886467..00f06f02e 100644 --- a/2.1-dev/risk/modules/risk_consequences.jsonld +++ b/2.1-dev/risk/modules/risk_consequences.jsonld @@ -1,6 +1,6 @@ [ { - "@id": "https://w3id.org/dpv/risk#Cryptojacking", + "@id": "https://w3id.org/dpv/risk#NonMaterialDamage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -14,7 +14,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-30" } ], "http://purl.org/dc/terms/modified": [ @@ -23,11 +23,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Neb960f38438d48258bee0ebae96be48e" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -41,13 +36,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Cryptojacking" + "@value": "Something that acts as or causes Non-Material Damage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -58,33 +53,40 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cryptojacking" - } - ] - }, - { - "@id": "_:Neb960f38438d48258bee0ebae96be48e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Landscape 2021" + "@value": "Non-Material Damage" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" + "@language": "en", + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" } ] }, { - "@id": "https://w3id.org/dpv/risk#IntegrityBreach", + "@id": "https://w3id.org/dpv/risk#RightsExercisePrevention", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -98,17 +100,35 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#DataBreach" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Prevent Exercising of Rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Prevent Exercising of Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0" + } ] }, { - "@id": "https://w3id.org/dpv/risk#UnwantedCodeDeletion", + "@id": "https://w3id.org/dpv/risk#SystemFailure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -133,7 +153,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nef681cfae64c43969ff8ef7fdde7753a" + "@id": "_:Nd794c9a0064e4fe6bb3a0ebd38859b9b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -149,13 +169,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Code Deletion" + "@value": "Something that acts as or causes System Failure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -166,28 +189,34 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Code Deletion" + "@value": "System Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here system refers to both hardware and software systems" } ] }, { - "@id": "_:Nef681cfae64c43969ff8ef7fdde7753a", + "@id": "_:Nd794c9a0064e4fe6bb3a0ebd38859b9b", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" } ] }, { - "@id": "https://w3id.org/dpv/risk#IllegalDataProcessing", + "@id": "https://w3id.org/dpv/risk#Reward", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -195,13 +224,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], "http://purl.org/dc/terms/modified": [ @@ -210,11 +239,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N83bd5296b4d94804a73f0e0518c39495" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -228,13 +252,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Illegal Processing of Data" + "@value": "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -245,34 +269,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Illegal Data Processing" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N83bd5296b4d94804a73f0e0518c39495", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Reward" } ] }, { - "@id": "https://w3id.org/dpv/risk#UserRisks", + "@id": "https://w3id.org/dpv/risk#ComponentFailure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -291,13 +293,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Concepts associated with risks that arise due to User or Human use" + "@value": "Something that acts as or causes Component Failure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -308,12 +313,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "User Risks" + "@value": "Component Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure", + "@id": "https://w3id.org/dpv/risk#Harm", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -327,7 +338,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-13" } ], "http://purl.org/dc/terms/modified": [ @@ -336,11 +347,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N540e39aa17014568ba5a2b03534c1f19" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -354,13 +360,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Disclosure" + "@value": "Something that acts as or causes Harm to humans" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -371,28 +377,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Disclosure" - } - ] - }, - { - "@id": "_:N540e39aa17014568ba5a2b03534c1f19", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "Harm" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@language": "en", + "@value": "This concept refers to the general abstract notion of harm" } ] }, { - "@id": "https://w3id.org/dpv/risk#ConfidentialityBreach", + "@id": "https://w3id.org/dpv/risk#ViolatingEthicsCode", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -417,7 +413,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N804ad242900c474395dd117c74dace8e" + "@id": "_:N5971f1bb7e3149b49a4335be11b0926f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -428,18 +424,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#DataBreach" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Confidentiality Breach" + "@value": "Something that acts as or causes Violation of Ethics Code" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -450,12 +446,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confidentiality Breach" + "@value": "Violating Ethics Code" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0" } ] }, { - "@id": "_:N804ad242900c474395dd117c74dace8e", + "@id": "_:N5971f1bb7e3149b49a4335be11b0926f", "@type": [ "https://schema.org/WebPage" ], @@ -471,42 +473,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#Privacy", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Privacy" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#LoseGoodwill", + "@id": "https://w3id.org/dpv/risk#UnwantedCodeDeletion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -531,7 +498,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N4f8237833a8141b2bb3c31cf5176bf42" + "@id": "_:N9b03e23aa8864f4288a1885778e3b1e4" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -547,13 +514,19 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Goodwill" + "@value": "Something that acts as or causes Unwanted Code Deletion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -564,28 +537,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Goodwill" + "@value": "Unwanted Code Deletion" } ] }, { - "@id": "_:N4f8237833a8141b2bb3c31cf5176bf42", + "@id": "_:N9b03e23aa8864f4288a1885778e3b1e4", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingStatutoryObligations", + "@id": "https://w3id.org/dpv/risk#DataCorruption", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -610,7 +583,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb5000792f7ae42ffb4c7efe3b93be7df" + "@id": "_:N8aaec0d1fefb4744abcf3099509b1988" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -626,13 +599,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Statutory Obligations" + "@value": "Something that acts as or causes Corruption of Data" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -643,18 +619,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Statutory Obligations" + "@value": "Data Corruption" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0" + "@value": "This concept was called \"Corruption Data\" in DPV 2.0" } ] }, { - "@id": "_:Nb5000792f7ae42ffb4c7efe3b93be7df", + "@id": "_:N8aaec0d1fefb4744abcf3099509b1988", "@type": [ "https://schema.org/WebPage" ], @@ -670,56 +646,21 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#SocietalHealthSafety", + "@id": "https://w3id.org/dpv/risk#LoseTrust", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Societal Health & Safety" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#Compensation", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -728,6 +669,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N95b0eaaa71714fb48e2d00a428e03220" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -741,13 +687,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms" + "@value": "Something that acts as or causes Loss of Trust" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -758,43 +704,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compensation" + "@value": "Lose of Trust" } ] }, { - "@id": "https://w3id.org/dpv/examples", + "@id": "_:N95b0eaaa71714fb48e2d00a428e03220", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Examples for Data Privacy Vocabulary" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/examples" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "https://schema.org/url": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingEthicsCode", + "@id": "https://w3id.org/dpv/risk#IllegalDataProcessing", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -819,7 +750,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd8ddc1f8024a4418b62c344837cff0cd" + "@id": "_:Nfbea264abf694083a7d1db8b2101092b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -830,7 +761,7 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ @@ -841,7 +772,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Ethics Code" + "@value": "Something that acts as or causes Illegal Processing of Data" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -852,18 +783,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Ethics Code" + "@value": "Illegal Data Processing" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0" + "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0" } ] }, { - "@id": "_:Nd8ddc1f8024a4418b62c344837cff0cd", + "@id": "_:Nfbea264abf694083a7d1db8b2101092b", "@type": [ "https://schema.org/WebPage" ], @@ -879,28 +810,28 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-n3", + "@id": "https://w3id.org/dpv/risk#serialisation-rdf", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://www.w3.org/TeamSubmission/n3/" + "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/text/n3" + "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" } ], "http://purl.org/dc/terms/title": [ { - "@value": "Risk Concepts - N3 serialiation" + "@value": "Risk Concepts - RDF/XML serialiation" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/risk.n3" + "@id": "https://w3id.org/dpv/risk/risk.rdf" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ @@ -910,7 +841,38 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#PersonalSafetyEndangerment", + "@id": "https://w3id.org/dpv/examples", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Examples for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/examples" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Misuse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -918,13 +880,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Delaram Golpayegani" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-06-11" } ], "http://purl.org/dc/terms/modified": [ @@ -933,11 +895,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Na66b6d002d3f448981a58870da1a686e" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -951,13 +908,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Personal Safety Endangerment" + "@value": "Something that acts as or causes Misuse" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -968,28 +925,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Personal Safety Endangerment" - } - ] - }, - { - "@id": "_:Na66b6d002d3f448981a58870da1a686e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage", + "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemAccess", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1003,7 +944,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -1012,6 +953,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6fdf74981d95420a82b9c97acf9aa9eb" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -1025,13 +971,19 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Non-Material Damage" + "@value": "Something that acts as or causes Unauthorised System Access" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1042,18 +994,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Non-Material Damage" + "@value": "Unauthorised System Access" + } + ] + }, + { + "@id": "_:N6fdf74981d95420a82b9c97acf9aa9eb", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#Injury", + "@id": "https://w3id.org/dpv/risk#Coercion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1078,7 +1040,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N1ef56bb9fadb431ba4c270603c7acdec" + "@id": "_:Nc78302d156fb497aae9594fa63bb9fa7" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1094,13 +1056,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Injury" + "@value": "Something that acts as or causes Coercion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1111,28 +1076,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Injury" + "@value": "Coercion" } ] }, { - "@id": "_:N1ef56bb9fadb431ba4c270603c7acdec", + "@id": "_:Nc78302d156fb497aae9594fa63bb9fa7", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk#Misuse", + "@id": "https://w3id.org/dpv/risk#IdentityFraud", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1140,13 +1105,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Delaram Golpayegani" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-06-11" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -1155,6 +1120,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nc74530c53d534886a66e5a7f741398bb" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -1168,13 +1138,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UserRisks" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Misuse" + "@value": "Something that acts as or causes Identity Fraud" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1185,12 +1158,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Misuse" + "@value": "Identity Fraud" } ] }, { - "@id": "https://w3id.org/dpv/risk#Reward", + "@id": "_:Nc74530c53d534886a66e5a7f741398bb", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Threat Taxonomy 2016" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#LoseNegotiatingCapacity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1198,13 +1187,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -1213,6 +1202,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nf8d97cf300cf44d5881be9535d0b1dff" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -1226,13 +1220,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee" + "@value": "Something that acts as or causes Loss of Negotiating Capacity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1243,26 +1237,42 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reward" + "@value": "Lose of Negotiating Capacity" } ] }, { - "@id": "https://w3id.org/dpv/risk#HumanErrors", + "@id": "_:Nf8d97cf300cf44d5881be9535d0b1dff", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#SocialDisadvantage", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-19" } ], "http://purl.org/dc/terms/modified": [ @@ -1271,11 +1281,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N7d9296887d1d4b6ea986d2ad6579a1ec" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -1289,13 +1294,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UserRisks" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Human Errors" + "@value": "Something that acts as or causes Social Disadvantage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1306,28 +1311,47 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Human Errors" + "@value": "Social Disadvantage" } ] }, { - "@id": "_:N7d9296887d1d4b6ea986d2ad6579a1ec", + "@id": "https://w3id.org/dpv/risk#PhysicalHarm", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@id": "https://w3id.org/dpv/risk#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#IndividualRisk" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Physical Harm" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises", + "@id": "https://w3id.org/dpv/risk#Reidentification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1341,7 +1365,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-19" } ], "http://purl.org/dc/terms/modified": [ @@ -1350,11 +1374,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N2b8ae4e96b21406bb91bfdec8f460776" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -1368,13 +1387,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Access to Premises" + "@value": "Something that acts as or causes Re-identification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1385,54 +1407,57 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Access to Premises" - } - ] - }, - { - "@id": "_:N2b8ae4e96b21406bb91bfdec8f460776", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Re-identification" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseCustomerConfidence", + "@id": "https://w3id.org/dpv/risk#Privacy", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "_:N0d138f94265e46f293490fbe0fc8074c" + "@language": "en", + "@value": "Privacy" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#LegalRisk", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -1447,13 +1472,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Customer Confidence" + "@value": "Risks and issues that have their basis in legal requirements and enforcement" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1464,28 +1489,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Customer Confidence" - } - ] - }, - { - "@id": "_:N0d138f94265e46f293490fbe0fc8074c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Legal Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#EquipmentMalfunction", + "@id": "https://w3id.org/dpv/risk#SystemIntrusion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1510,7 +1519,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N7f1dc230141c4448a99f28f362191020" + "@id": "_:Ne8bd9725515e46d0a941f4a4665a7868" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1526,13 +1535,22 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Equipment Malfunction" + "@value": "Something that acts as or causes System Intrusion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1543,34 +1561,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Equipment Malfunction" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here equipment refers to physical equipment" + "@value": "System Intrusion" } ] }, { - "@id": "_:N7f1dc230141c4448a99f28f362191020", + "@id": "_:Ne8bd9725515e46d0a941f4a4665a7868", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedResourceUse", + "@id": "https://w3id.org/dpv/risk#Spoofing", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1595,7 +1607,10 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd4175f97fd33423f9014c3d690d56fad" + "@id": "_:N539160303302464aa341bdfa53068f22" + }, + { + "@id": "_:N0085b3ac0b474cf1a64eccdff3718c8d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1610,14 +1625,23 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Resource Use" + "@value": "Something that acts as or causes Spoofing" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1628,12 +1652,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Resource Use" + "@value": "Spoofing" } ] }, { - "@id": "_:Nd4175f97fd33423f9014c3d690d56fad", + "@id": "_:N539160303302464aa341bdfa53068f22", "@type": [ "https://schema.org/WebPage" ], @@ -1649,7 +1673,23 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedDataDisclosure", + "@id": "_:N0085b3ac0b474cf1a64eccdff3718c8d", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1674,7 +1714,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nf415d60c8c8849ba95e5611d481b06ce" + "@id": "_:N7487c570f8f54358874e08fa38c8f27d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1689,6 +1729,15 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -1696,7 +1745,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Disclosure" + "@value": "Something that acts as or causes Unauthorised Access to Premises" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1707,12 +1756,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Disclosure" + "@value": "Unauthorised Access to Premises" } ] }, { - "@id": "_:Nf415d60c8c8849ba95e5611d481b06ce", + "@id": "_:N7487c570f8f54358874e08fa38c8f27d", "@type": [ "https://schema.org/WebPage" ], @@ -1728,7 +1777,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#Coercion", + "@id": "https://w3id.org/dpv/risk#Discrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1736,13 +1785,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-19" } ], "http://purl.org/dc/terms/modified": [ @@ -1751,11 +1800,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N61513676426149faae9e58063eb667d8" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -1769,13 +1813,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Coercion" + "@value": "Something that acts as or causes Discrimination" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1786,28 +1830,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Coercion" - } - ] - }, - { - "@id": "_:N61513676426149faae9e58063eb667d8", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#RightsViolation", + "@id": "https://w3id.org/dpv/risk#Compensation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1821,7 +1849,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-04-14" } ], "http://purl.org/dc/terms/modified": [ @@ -1843,13 +1871,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Rights" + "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1860,18 +1888,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0" + "@value": "Compensation" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolenceAgainstChildren", + "@id": "https://w3id.org/dpv/risk#LoseCustomerConfidence", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1896,7 +1918,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb34535276ddd4a56ac18dcc8fc489cbb" + "@id": "_:N669b51dd9b0f4a71983f16dfc274956a" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1912,13 +1934,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Child Violence" + "@value": "Something that acts as or causes Loss of Customer Confidence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1929,34 +1951,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violence against children" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ChildViolence\" in DPV 2.0" + "@value": "Lose of Customer Confidence" } ] }, { - "@id": "_:Nb34535276ddd4a56ac18dcc8fc489cbb", + "@id": "_:N669b51dd9b0f4a71983f16dfc274956a", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#RightsLimitation", + "@id": "https://w3id.org/dpv/risk#HumanErrors", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1964,13 +1980,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -1979,6 +1995,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Na882c52257364f5896e5b38b50bb08fe" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -1992,13 +2013,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Limitation of Rights" + "@value": "Something that acts as or causes Human Errors" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2009,18 +2030,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Limitation of Rights" + "@value": "Human Errors" } + ] + }, + { + "@id": "_:Na882c52257364f5896e5b38b50bb08fe", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#DistributedDenialServiceAttack", + "@id": "https://w3id.org/dpv/risk#Injury", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2045,7 +2076,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N842f6dd3b92c482180f56ce6a495c382" + "@id": "_:Na6c5e17bb8ac4135b62412f66dd88460" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2061,13 +2092,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Distributed Denial of Service Attack (DDoS)" + "@value": "Something that acts as or causes Injury" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2078,12 +2109,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Distributed Denial of Service Attack (DDoS)" + "@value": "Injury" } ] }, { - "@id": "_:N842f6dd3b92c482180f56ce6a495c382", + "@id": "_:Na6c5e17bb8ac4135b62412f66dd88460", "@type": [ "https://schema.org/WebPage" ], @@ -2099,7 +2130,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedDataAccess", + "@id": "https://w3id.org/dpv/risk#ViolatingStatutoryObligations", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2124,7 +2155,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nc799e152712d4ee48d59c2a1366fca7f" + "@id": "_:Ne3511d0b904a403e93b1538888ad1023" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2135,18 +2166,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Access" + "@value": "Something that acts as or causes Violation of Statutory Obligations" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2157,69 +2188,34 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Access" - } - ] - }, - { - "@id": "_:Nc799e152712d4ee48d59c2a1366fca7f", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "Violation of Statutory Obligations" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@language": "en", + "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk#JudicialPenalty", + "@id": "_:Ne3511d0b904a403e93b1538888ad1023", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that involves or causes judicial penalties to be paid" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Judicial Penalty" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemAccess", + "@id": "https://w3id.org/dpv/risk#RightsImpact", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2244,7 +2240,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N4387faf4bb854435bfdc47ebf666782a" + "@id": "_:N7b552ef83c274f84b167cc68c23676bb" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2260,13 +2256,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" + }, + { + "@id": "https://w3id.org/dpv#Impact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised System Access" + "@value": "Something that acts as or causes Impact to Rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2277,12 +2276,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised System Access" + "@value": "Impact to Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ImpactToRights\" in DPV 2.0" } ] }, { - "@id": "_:N4387faf4bb854435bfdc47ebf666782a", + "@id": "_:N7b552ef83c274f84b167cc68c23676bb", "@type": [ "https://schema.org/WebPage" ], @@ -2298,33 +2303,46 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#SecurityBreach", + "@id": "https://w3id.org/dpv/risk#IndividualHealthSafety", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "_:Nee086e9da9f643e2837c115c27f1cabc" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Individual Health & Safety" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ReputationalRisk", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -2339,13 +2357,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Security Breach" + "@value": "Risks and issues that affect the reputation of the organisation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2356,55 +2374,17 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Security Breach" - } - ] - }, - { - "@id": "_:Nee086e9da9f643e2837c115c27f1cabc", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Reputational Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#SexualViolence", + "@id": "https://w3id.org/dpv/risk#ViolatingPolicy", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nbeddee22b7a841e39879764ab63949f8" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -2418,13 +2398,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Sexual Violence" + "@value": "Something that acts as or causes violation of policy which can be either internal or external policy" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2435,28 +2415,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sexual Violence" - } - ] - }, - { - "@id": "_:Nbeddee22b7a841e39879764ab63949f8", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Violating Policy" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemModification", + "@id": "https://w3id.org/dpv/risk#InterceptCommunications", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2481,7 +2445,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0c47798cd08a44d790a99ee3c58dcfb9" + "@id": "_:N1f36b972c50f49fb9b474152b57cf474" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2492,10 +2456,13 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -2503,7 +2470,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised System Modification" + "@value": "Something that acts as or causes Interception of Communications" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2514,54 +2481,79 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised System Modification" + "@value": "Intercept Communications" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0" } ] }, { - "@id": "_:N0c47798cd08a44d790a99ee3c58dcfb9", + "@id": "_:N1f36b972c50f49fb9b474152b57cf474", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnwantedDataDeletion", + "@id": "https://w3id.org/dpv/risk#JudicialPenalty", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that involves or causes judicial penalties to be paid" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "_:N7ff2bed0d152400e90aff3c52f1320b0" + "@language": "en", + "@value": "Judicial Penalty" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#AccidentalMisuse", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -2576,13 +2568,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Data Deletion" + "@value": "Accidental Misuse" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2593,28 +2585,53 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Data Deletion" + "@value": "Accidental Misuse" } ] }, { - "@id": "_:N7ff2bed0d152400e90aff3c52f1320b0", + "@id": "https://w3id.org/dpv/risk#EnvironmentalRisk", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv#RiskConcept" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Risks and issues that have their origin in environment or can affect the environment at large" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Environmental Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#Spoofing", + "@id": "https://w3id.org/dpv/risk#Extorsion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2639,10 +2656,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N603a4b8fadf24d23ac9c224927644c9d" - }, - { - "@id": "_:N698cebdfba864777b23d25052c4d2493" + "@id": "_:N78e6085a5a4a4a08adbcdb4af46722d9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2658,16 +2672,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" }, { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Spoofing" + "@value": "Something that acts as or causes Extorsion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2678,44 +2692,89 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Spoofing" + "@value": "Extorsion" } ] }, { - "@id": "_:N603a4b8fadf24d23ac9c224927644c9d", + "@id": "_:N78e6085a5a4a4a08adbcdb4af46722d9", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "_:N698cebdfba864777b23d25052c4d2493", + "@id": "https://w3id.org/dpv/risk#UnauthorisedReidentification", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Georg P. Krog" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-19" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Unauthorised Re-Identification" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Unauthorised Re-Identification" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExposureToHarmfulSpeech", + "@id": "https://w3id.org/dpv/risk#ConfidentialityBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2740,7 +2799,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ne595b225e5ee4cc2b2374256ef05fa2e" + "@id": "_:N0571680fc6554da2a384a2e851d510c0" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2756,13 +2815,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#DataBreach" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Harmful Speech" + "@value": "Something that acts as or causes Confidentiality Breach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2773,70 +2835,96 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Exposure to Harmful Speech" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0" + "@value": "Confidentiality Breach" } ] }, { - "@id": "_:Ne595b225e5ee4cc2b2374256ef05fa2e", + "@id": "_:N0571680fc6554da2a384a2e851d510c0", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/guides", + "@id": "https://w3id.org/dpv/risk#FinancialImpact", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.w3.org/TR/html/" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@value": "Guides for Data Privacy Vocabulary" + "@id": "https://w3id.org/dpv#RiskConcept" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/guides" + "@language": "en", + "@value": "Things that cause or have the potential to impact financial resources" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Financial Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk#InternalSecurityThreat", + "@id": "https://w3id.org/dpv/risk#Terrorism", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N84e706a33b7c462194d2c8fb5c04326c" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -2850,13 +2938,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Concepts associated with security threats and issues that originate within the organisation" + "@value": "Something that acts as or causes Terrorism" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2867,79 +2955,134 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Internal Security Threat" + "@value": "Terrorism" } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-ttl", + "@id": "_:N84e706a33b7c462194d2c8fb5c04326c", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/conformsTo": [ + "https://schema.org/name": [ { - "@id": "https://www.w3.org/TR/turtle/" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/format": [ + "https://schema.org/url": [ { - "@id": "https://www.iana.org/assignments/media-types/text/turtle" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#PublicOrderBreach", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/title": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "Risk Concepts - Turtle serialiation" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk/risk.ttl" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-jsonld", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://www.w3.org/TR/json-ld11/" + "@id": "_:N1d102af8ecd94ce3a875a9a2a7e78bcc" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.iana.org/assignments/media-types/application/ld+json" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "Risk Concepts - JSON-LD serialiation" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk/risk.jsonld" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@language": "en", + "@value": "Something that acts as or causes Public Order Breach" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Public Order Breach" } ] }, { - "@id": "https://w3id.org/dpv/risk#LegalRisk", + "@id": "_:N1d102af8ecd94ce3a875a9a2a7e78bcc", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#UnwantedDataDeletion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nde382e9a51c445d69476b298827b1cbe" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -2953,13 +3096,19 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that have their basis in legal requirements and enforcement" + "@value": "Something that acts as or causes Unwanted Data Deletion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2970,12 +3119,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Legal Risk" + "@value": "Unwanted Data Deletion" } ] }, { - "@id": "https://w3id.org/dpv/risk#SystemFailure", + "@id": "_:Nde382e9a51c445d69476b298827b1cbe", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ErroneousSystemUse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3000,7 +3165,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ndb0e0e85d6ad4dabbf9efc7a0f2cb59a" + "@id": "_:N258e312c37aa4354bed73603ef7a36f6" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3016,13 +3181,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Failure" + "@value": "Something that acts as or causes Erroneous System Use" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3033,34 +3198,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Failure" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here system refers to both hardware and software systems" + "@value": "Erroneous System Use" } ] }, { - "@id": "_:Ndb0e0e85d6ad4dabbf9efc7a0f2cb59a", + "@id": "_:N258e312c37aa4354bed73603ef7a36f6", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeModification", + "@id": "https://w3id.org/dpv/risk#Cryptojacking", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3085,7 +3244,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N8ae12eb2b96a4c7e97a8739ee00ffe80" + "@id": "_:N3adf839933da482c89a2828fc9743969" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3100,6 +3259,9 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -3107,7 +3269,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Modification" + "@value": "Something that acts as or causes Cryptojacking" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3118,33 +3280,56 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Modification" + "@value": "Cryptojacking" } ] }, { - "@id": "_:N8ae12eb2b96a4c7e97a8739ee00ffe80", + "@id": "_:N3adf839933da482c89a2828fc9743969", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ENISA Threat Landscape 2021" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" } ] }, { - "@id": "https://w3id.org/dpv/risk#JudicialCosts", + "@id": "https://w3id.org/dpv/risk#Fee", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-04-14" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "DGA 2.10" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -3153,7 +3338,7 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ @@ -3164,7 +3349,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that involves or causes judicial costs to be paid" + "@value": "Something that acts as or provides fees e.g. for using a service" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3175,12 +3360,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Judicial Costs" + "@value": "Fee" } ] }, { - "@id": "https://w3id.org/dpv/risk#PublicOrderBreach", + "@id": "https://w3id.org/dpv/risk#LoseCredibility", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3205,7 +3390,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N2bd2812bbacb46319d2bdb0e95e02f65" + "@id": "_:N2c068c379d9b4c2b8da0937ad8be6a81" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3221,13 +3406,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Public Order Breach" + "@value": "Something that acts as or causes Loss of Credibility" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3238,12 +3423,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Public Order Breach" + "@value": "Lose of Credibility" } ] }, { - "@id": "_:N2bd2812bbacb46319d2bdb0e95e02f65", + "@id": "_:N2c068c379d9b4c2b8da0937ad8be6a81", "@type": [ "https://schema.org/WebPage" ], @@ -3259,7 +3444,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#MaterialDamage", + "@id": "https://w3id.org/dpv/risk#ViolatingLegalObligation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3273,7 +3458,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -3282,6 +3467,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N0b5dd4cc254540f49140434e86708abb" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -3290,7 +3480,7 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ @@ -3301,7 +3491,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Material Damage" + "@value": "Something that acts as or causes Violation of Legal Obligations" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3312,18 +3502,34 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Material Damage" + "@value": "Violation of Legal Obligations" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" + "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk#DataCorruption", + "@id": "_:N0b5dd4cc254540f49140434e86708abb", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#FinancialLoss", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3348,7 +3554,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ncd7b81f0daef4263a47284ebb48b83f6" + "@id": "_:N698d6b9272804e2dba685b14f6e69152" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3359,18 +3565,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Corruption of Data" + "@value": "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3381,18 +3587,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Corruption" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"Corruption Data\" in DPV 2.0" + "@value": "Financial Loss" } ] }, { - "@id": "_:Ncd7b81f0daef4263a47284ebb48b83f6", + "@id": "_:N698d6b9272804e2dba685b14f6e69152", "@type": [ "https://schema.org/WebPage" ], @@ -3408,66 +3608,35 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-rdf", + "@id": "https://w3id.org/dpv/risk#ExposureToHarmfulSpeech", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/title": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "Risk Concepts - RDF/XML serialiation" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/risk/risk.rdf" + "@id": "_:N95f46ba999c74717949420ed05a75570" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#CompromiseAccountCredentials", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nf877665a169e4a7eac29964fc15db245" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" } @@ -3480,13 +3649,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Account Credentials to be compromised" + "@value": "Something that acts as or causes Harmful Speech" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3497,12 +3666,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account Credentials" + "@value": "Exposure to Harmful Speech" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0" } ] }, { - "@id": "_:Nf877665a169e4a7eac29964fc15db245", + "@id": "_:N95f46ba999c74717949420ed05a75570", "@type": [ "https://schema.org/WebPage" ], @@ -3518,48 +3693,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv#RiskConcept" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Risks and issues that affect the reputation of the organisation" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Reputational Risk" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeAccess", + "@id": "https://w3id.org/dpv/risk#SystemMalfunction", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3584,7 +3718,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N8193907d23bd43dc8b146573989b8a0d" + "@id": "_:N18aeaa08367a4c56822793249e34feae" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3600,13 +3734,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Access" + "@value": "Something that acts as or causes System Malfunction" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3617,28 +3754,34 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Access" + "@value": "System Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here system refers to both hardware and software systems" } ] }, { - "@id": "_:N8193907d23bd43dc8b146573989b8a0d", + "@id": "_:N18aeaa08367a4c56822793249e34feae", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#AuthorisationFailure", + "@id": "https://w3id.org/dpv/risk#SecurityBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3663,7 +3806,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N8906a1d2a7bd4484854e88a2dc1b93a5" + "@id": "_:Nb3034bc7cf1e485b85582c21529ebaa4" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3678,6 +3821,15 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, { "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } @@ -3685,7 +3837,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Authorisation Failure" + "@value": "Something that acts as or causes Security Breach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3696,34 +3848,60 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Authorisation Failure" + "@value": "Security Breach" } ] }, { - "@id": "_:N8906a1d2a7bd4484854e88a2dc1b93a5", + "@id": "_:Nb3034bc7cf1e485b85582c21529ebaa4", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISa Trust Services Security Incidents 2021" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes", + "@id": "https://w3id.org/dpv/risk#IntegrityBreach", "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#DataBreach" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } ] }, { - "@id": "https://w3id.org/dpv/risk#SystemMalfunction", + "@id": "https://w3id.org/dpv/risk#ViolenceAgainstChildren", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3748,7 +3926,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N1c2325e64024454ebc2e79f9e388cf3b" + "@id": "_:N50def33314ee4442bf7e77161e51165b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3764,13 +3942,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Malfunction" + "@value": "Something that acts as or causes Child Violence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3781,56 +3959,39 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Malfunction" + "@value": "Violence against children" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Here system refers to both hardware and software systems" + "@value": "This concept was called \"ChildViolence\" in DPV 2.0" } ] }, { - "@id": "_:N1c2325e64024454ebc2e79f9e388cf3b", + "@id": "_:N50def33314ee4442bf7e77161e51165b", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#SocialDisadvantage", + "@id": "https://w3id.org/dpv/risk#SocietalRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -3844,13 +4005,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Social Disadvantage" + "@value": "Risks and issues that affect or have the potential to affect society at large or specific groups in society" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3861,12 +4022,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Social Disadvantage" + "@value": "Societal Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#Reidentification", + "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeModification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3880,7 +4041,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -3889,6 +4050,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Ncecbd81981b3460f9cede6031d4ab8b1" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -3902,13 +4068,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Re-identification" + "@value": "Something that acts as or causes Unauthorised Code Modification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3919,18 +4088,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Re-identification" + "@value": "Unauthorised Code Modification" + } + ] + }, + { + "@id": "_:Ncecbd81981b3460f9cede6031d4ab8b1", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#Damage", + "@id": "https://w3id.org/dpv/risk#UnauthorisedResourceUse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3944,7 +4123,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -3953,6 +4132,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N605e2cac18a74200ab14cc33e319b6cb" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -3966,13 +4150,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Damage" + "@value": "Something that acts as or causes Unauthorised Resource Use" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3983,37 +4170,75 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Damage" + "@value": "Unauthorised Resource Use" } ] }, { - "@id": "https://w3id.org/dpv/risk#SecurityAttack", + "@id": "_:N605e2cac18a74200ab14cc33e319b6cb", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "accepted" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "https://schema.org/url": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#LoseGoodwill", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N194bc10f01ef4bdb99f12487816e6826" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes an attack on security with the aim of undermining it" + "@value": "Something that acts as or causes Loss of Goodwill" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4024,43 +4249,78 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Security Attack" + "@value": "Lose of Goodwill" } ] }, { - "@id": "https://w3id.org/dpv/primer", + "@id": "_:N194bc10f01ef4bdb99f12487816e6826", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/conformsTo": [ + "https://schema.org/name": [ { - "@id": "https://www.w3.org/TR/html/" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/format": [ + "https://schema.org/url": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ComponentMalfunction", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "Primer for Data Privacy Vocabulary" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/primer" + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@language": "en", + "@value": "Something that acts as or causes Component Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Component Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of" } ] }, { - "@id": "https://w3id.org/dpv/risk#Fraud", + "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemModification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4085,7 +4345,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd4dde0f0f01e4d739b22630aa8ad7d7a" + "@id": "_:N029a97b214024c18a899586cb3864d2a" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4100,6 +4360,9 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -4107,7 +4370,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Fraud" + "@value": "Something that acts as or causes Unauthorised System Modification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4118,28 +4381,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Fraud" + "@value": "Unauthorised System Modification" } ] }, { - "@id": "_:Nd4dde0f0f01e4d739b22630aa8ad7d7a", + "@id": "_:N029a97b214024c18a899586cb3864d2a", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#SystemIntrusion", + "@id": "https://w3id.org/dpv/risk#Sabotage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4164,7 +4427,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N7a5848cbabb14c8ea2d162432eba32f0" + "@id": "_:N2fc72d8ce45943bcaad06c0a96aac629" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4179,6 +4442,12 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -4186,7 +4455,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Intrusion" + "@value": "Something that acts as or causes Sabotage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4197,12 +4466,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Intrusion" + "@value": "Sabotage" } ] }, { - "@id": "_:N7a5848cbabb14c8ea2d162432eba32f0", + "@id": "_:N2fc72d8ce45943bcaad06c0a96aac629", "@type": [ "https://schema.org/WebPage" ], @@ -4218,7 +4487,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#DenialServiceAttack", + "@id": "https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4243,10 +4512,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N51a29309d655420e8611a50e7d2baa7c" - }, - { - "@id": "_:Nf82ac345e0fe44a394f7da0ec78ef801" + "@id": "_:N89971235b5e34930a94f46c696e0ac94" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4261,6 +4527,9 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -4268,7 +4537,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Denial of Service Attack (DoS)" + "@value": "Something that acts as or causes Unauthorised Information Disclosure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4279,48 +4548,54 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Denial of Service Attack (DoS)" + "@value": "Unauthorised Information Disclosure" } ] }, { - "@id": "_:N51a29309d655420e8611a50e7d2baa7c", + "@id": "_:N89971235b5e34930a94f46c696e0ac94", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "_:Nf82ac345e0fe44a394f7da0ec78ef801", + "@id": "https://w3id.org/dpv/risk#SexualViolence", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Ncb4b4f28b9894b79bfd2a5d2dd41f88f" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#EnvironmentalRisk", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -4335,13 +4610,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that have their origin in environment or can affect the environment at large" + "@value": "Something that acts as or causes Sexual Violence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4352,12 +4627,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Environmental Risk" + "@value": "Sexual Violence" } ] }, { - "@id": "https://w3id.org/dpv/risk#MalwareAttack", + "@id": "_:Ncb4b4f28b9894b79bfd2a5d2dd41f88f", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#AuthorisationFailure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4382,7 +4673,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N933b42794d4f41a39ee17bc9b20bf774" + "@id": "_:N588812d3250243469d4d5b0cbd82dc9e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4398,13 +4689,19 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Malware Attack" + "@value": "Something that acts as or causes Authorisation Failure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4415,28 +4712,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Malware Attack" + "@value": "Authorisation Failure" } ] }, { - "@id": "_:N933b42794d4f41a39ee17bc9b20bf774", + "@id": "_:N588812d3250243469d4d5b0cbd82dc9e", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ENISa Trust Services Security Incidents 2021" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-html", + "@id": "https://w3id.org/dpv/primer", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], @@ -4452,51 +4749,53 @@ ], "http://purl.org/dc/terms/title": [ { - "@value": "Risk Concepts - HTML serialiation" + "@value": "Primer for Data Privacy Vocabulary" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/risk.html" + "@id": "https://w3id.org/dpv/primer" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/specification" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk#AvailabilityBreach", + "@id": "https://w3id.org/dpv/guides", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://www.w3.org/TR/html/" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/format": [ { - "@language": "en", - "@value": "accepted" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/dc/terms/title": [ { - "@id": "https://w3id.org/dpv/risk#DataBreach" + "@value": "Guides for Data Privacy Vocabulary" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/guides" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk#Harm", + "@id": "https://w3id.org/dpv/risk#CopyrightViolation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4510,7 +4809,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-13" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -4519,6 +4818,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N3984b17b1694455793b94c3ad850178d" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -4532,13 +4836,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Harm to humans" + "@value": "Something that acts as or causes Copyright Violation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4549,18 +4853,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Harm" + "@value": "Copyright Violation" } + ] + }, + { + "@id": "_:N3984b17b1694455793b94c3ad850178d", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "This concept refers to the general abstract notion of harm" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingContractualObligation", + "@id": "https://w3id.org/dpv/risk#EquipmentMalfunction", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4585,7 +4899,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N1802c2900f5b4c578896c91c3149381d" + "@id": "_:N53bfad5db8324151841ce01472d06f41" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4596,18 +4910,21 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Contractual Obligations" + "@value": "Something that acts as or causes Equipment Malfunction" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4618,18 +4935,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Contractual Obligation" + "@value": "Equipment Malfunction" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0" + "@value": "Here equipment refers to physical equipment" } ] }, { - "@id": "_:N1802c2900f5b4c578896c91c3149381d", + "@id": "_:N53bfad5db8324151841ce01472d06f41", "@type": [ "https://schema.org/WebPage" ], @@ -4645,7 +4962,39 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#Extorsion", + "@id": "https://w3id.org/dpv/risk#AvailabilityBreach", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#DataBreach" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedDataDisclosure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4670,7 +5019,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N40f94dff19814aa6ae7d3074eb3409d8" + "@id": "_:N7c66233cabb64c2486ae612a1ff6b01d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4685,6 +5034,9 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -4692,7 +5044,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Extorsion" + "@value": "Something that acts as or causes Unauthorised Data Disclosure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4703,28 +5055,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extorsion" + "@value": "Unauthorised Data Disclosure" } ] }, { - "@id": "_:N40f94dff19814aa6ae7d3074eb3409d8", + "@id": "_:N7c66233cabb64c2486ae612a1ff6b01d", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#IndividualHealthSafety", + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4743,7 +5095,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv#RiskConcept" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Risks and issues that arise during operational processes" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4754,12 +5112,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Individual Health & Safety" + "@value": "Operational Security Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#PsychologicalHarm", + "@id": "https://w3id.org/dpv/risk#UnauthorisedDataModification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4784,7 +5142,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N903ec696d7504183af4ba63f3f295e8e" + "@id": "_:Nb76ee4ad00614561b02ea8b1fd3da77c" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4800,13 +5158,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Psychological Harm" + "@value": "Something that acts as or causes Unauthorised Data Modification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4817,12 +5178,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Psychological Harm" + "@value": "Unauthorised Data Modification" } ] }, { - "@id": "_:N903ec696d7504183af4ba63f3f295e8e", + "@id": "_:Nb76ee4ad00614561b02ea8b1fd3da77c", "@type": [ "https://schema.org/WebPage" ], @@ -4838,7 +5199,38 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#PhysicalAssault", + "@id": "https://w3id.org/dpv/risk#serialisation-jsonld", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/json-ld11/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/application/ld+json" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - JSON-LD serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.jsonld" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#LoseReputation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4863,7 +5255,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N4414613afa8c4456b9a9b6c3f17a7a0c" + "@id": "_:N90d89ca8a8594ecabee31205aee25395" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4879,13 +5271,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Physical Assault" + "@value": "Something that acts as or causes Loss of Reputation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4896,12 +5288,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Physical Assault" + "@value": "Lose of Reputation" } ] }, { - "@id": "_:N4414613afa8c4456b9a9b6c3f17a7a0c", + "@id": "_:N90d89ca8a8594ecabee31205aee25395", "@type": [ "https://schema.org/WebPage" ], @@ -4917,7 +5309,13 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure", + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeAccess", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4942,7 +5340,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb2d6659136cf4d2fa881ae5798bf0e58" + "@id": "_:N99568e0cd3774d348d85262f04bc3a0b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4957,6 +5355,12 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -4964,7 +5368,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Information Disclosure" + "@value": "Something that acts as or causes Unauthorised Code Access" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4975,28 +5379,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Information Disclosure" + "@value": "Unauthorised Code Access" } ] }, { - "@id": "_:Nb2d6659136cf4d2fa881ae5798bf0e58", + "@id": "_:N99568e0cd3774d348d85262f04bc3a0b", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#RightsImpact", + "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -5021,7 +5425,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N4e0b95db2d414e7588f607d2edf6902e" + "@id": "_:Nc4c391b305be479eb0e623d887a478ac" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5037,16 +5441,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" }, { - "@id": "https://w3id.org/dpv#Impact" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Impact to Rights" + "@value": "Something that acts as or causes Unauthorised Code Disclosure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5057,34 +5461,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Impact to Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ImpactToRights\" in DPV 2.0" + "@value": "Unauthorised Code Disclosure" } ] }, { - "@id": "_:N4e0b95db2d414e7588f607d2edf6902e", + "@id": "_:Nc4c391b305be479eb0e623d887a478ac", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#DataBreach", + "@id": "https://w3id.org/dpv/risk#DistributedDenialServiceAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -5109,15 +5507,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N82834c9f1ecf4644ab2d9343a1169c62" - } - ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples#E0069" - }, - { - "@id": "https://w3id.org/dpv/examples#E0071" + "@id": "_:N64ebcf10636d495599fc0fd262e44103" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5133,13 +5523,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SecurityBreach" + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Data Breach" + "@value": "Something that acts as or causes Distributed Denial of Service Attack (DDoS)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5150,12 +5543,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Breach" + "@value": "Distributed Denial of Service Attack (DDoS)" } ] }, { - "@id": "_:N82834c9f1ecf4644ab2d9343a1169c62", + "@id": "_:N64ebcf10636d495599fc0fd262e44103", "@type": [ "https://schema.org/WebPage" ], @@ -5171,29 +5564,12 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#RightsExercisePrevention", + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -5207,13 +5583,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Prevent Exercising of Rights" + "@value": "Concepts associated with security threats that are likely to originate externally" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5224,18 +5600,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Prevent Exercising of Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0" + "@value": "External Security Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk#Detriment", + "@id": "https://w3id.org/dpv/risk#PhishingScam", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -5243,13 +5613,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -5258,6 +5628,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nb657a11b610f419a86eb9ea4a94e7e37" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -5271,13 +5646,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Detriment" + "@value": "Something that acts as or causes Phishing Scam" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5288,37 +5666,48 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Detriment" + "@value": "Phishing Scam" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseReputation", + "@id": "_:Nb657a11b610f419a86eb9ea4a94e7e37", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" } ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Damage", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-03-30" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:N0282f3114f5b4278b632620b9b954c7d" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5334,13 +5723,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Reputation" + "@value": "Something that acts as or causes Damage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5351,28 +5740,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Reputation" - } - ] - }, - { - "@id": "_:N0282f3114f5b4278b632620b9b954c7d", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Damage" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingCodeOfConduct", + "@id": "https://w3id.org/dpv/risk#Renumeration", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -5380,13 +5753,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], "http://purl.org/dc/terms/modified": [ @@ -5395,11 +5768,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N3d2e8d97024142dca7a47b73cbb8097c" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -5408,18 +5776,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Code of Conduct" + "@value": "Something that acts as or provides renumeration which is in monetary or financial form" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5430,34 +5798,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Code of Conduct" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N3d2e8d97024142dca7a47b73cbb8097c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Remuneration" } ] }, { - "@id": "https://w3id.org/dpv/risk#FinancialLoss", + "@id": "https://w3id.org/dpv/risk#LoseOpportunity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -5482,7 +5828,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0296c48d481641d492572a05652b6bf5" + "@id": "_:N2ea871931e3746e4aff469f67008e44f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5498,13 +5844,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity" + "@value": "Something that acts as or causes Loss of Opportunity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5515,12 +5861,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Loss" + "@value": "Lose of Opportunity" } ] }, { - "@id": "_:N0296c48d481641d492572a05652b6bf5", + "@id": "_:N2ea871931e3746e4aff469f67008e44f", "@type": [ "https://schema.org/WebPage" ], @@ -5536,10 +5882,33 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#IndividualRisk", + "@id": "https://w3id.org/dpv/risk#UnauthorisedDataAccess", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N0eacc049940646a99623da2cd6a2d394" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -5552,10 +5921,18 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that affect or have the potential to affect specific individuals" + "@value": "Something that acts as or causes Unauthorised Data Access" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5566,12 +5943,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Individual Risk" + "@value": "Unauthorised Data Access" } ] }, { - "@id": "https://w3id.org/dpv/risk#Blackmail", + "@id": "_:N0eacc049940646a99623da2cd6a2d394", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#CompromiseAccountCredentials", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -5596,7 +5989,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N3ef9f5a9eb554279905f69c263712205" + "@id": "_:N1005943ded74408ea68c811475686000" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5612,13 +6005,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Blackmail" + "@value": "Something that acts as or causes Account Credentials to be compromised" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5629,28 +6025,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Blackmail" + "@value": "Compromise Account Credentials" } ] }, { - "@id": "_:N3ef9f5a9eb554279905f69c263712205", + "@id": "_:N1005943ded74408ea68c811475686000", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseNegotiatingCapacity", + "@id": "https://w3id.org/dpv/risk#UnwantedDisclosureData", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -5675,7 +6071,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd8a232e440f041b496b97da8007b588a" + "@id": "_:Nf14815c8a8694940bcdb35d12bf37b11" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5691,13 +6087,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Negotiating Capacity" + "@value": "Something that acts as or causes Unwanted Disclosure of Data" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5708,12 +6107,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Negotiating Capacity" + "@value": "Unwanted Disclosure of Data" } ] }, { - "@id": "_:Nd8a232e440f041b496b97da8007b588a", + "@id": "_:Nf14815c8a8694940bcdb35d12bf37b11", "@type": [ "https://schema.org/WebPage" ], @@ -5729,240 +6128,210 @@ ] }, { - "@id": "https://w3id.org/dpv/risk", + "@id": "https://w3id.org/dpv/risk#JudicialCosts", "@type": [ - "http://www.w3.org/2002/07/owl#Ontology", - "http://www.w3.org/ns/dx/prof/Profile" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/bibliographicCitation": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@value": "http://www.w3.org/2000/01/rdf-schema" - }, + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "http://www.w3.org/2004/02/skos/core" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - }, - { - "@value": "Georg P. Krog" - }, + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@value": "Beatriz Esteves" - }, + "@id": "https://w3id.org/dpv/risk#FinancialImpact" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@value": "Axel Polleres" - }, + "@language": "en", + "@value": "Something that involves or causes judicial costs to be paid" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@value": "Fajar Ekaputra" - }, + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "Delaram Golpayegani" - }, + "@language": "en", + "@value": "Judicial Costs" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#UserRisks", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Julian Flake" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "2022-08-14" + "@value": "accepted" } ], - "http://purl.org/dc/terms/creator": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@language": "en", - "@value": "Harshvardhan J. Pandit" - }, + "@id": "https://w3id.org/dpv#RiskConcept" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Georg P. Krog" - }, + "@value": "Concepts associated with risks that arise due to User or Human use" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@language": "en", - "@value": "Paul Ryan" - }, + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Rob Brennan" - }, - { - "@language": "en", - "@value": "Delaram Golpayegani" - }, - { - "@language": "en", - "@value": "Beatriz Esteves" - }, - { - "@language": "en", - "@value": "Julian Flake" - } - ], - "http://purl.org/dc/terms/description": [ - { - "@language": "en", - "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" - } - ], - "http://purl.org/dc/terms/identifier": [ - { - "@value": "https://w3id.org/dpv/risk" + "@value": "User Risks" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ViolatingContractualObligation", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/issued": [ + "http://purl.org/dc/terms/contributor": [ { - "@language": "en", - "@value": "2022-08-14" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/license": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.w3.org/copyright/document-license-2023/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "2024-07-13" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/publisher": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://www.w3.org/" + "@id": "_:N638499f1a35f4f94abab8a1e6e4bf97d" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.w3.org/groups/cg/dpvcg/" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "Risk Concepts" + "@value": "modified" } ], - "http://purl.org/ontology/bibo/doi": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@value": "10.5281/zenodo.12505841" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], - "http://purl.org/ontology/bibo/status": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@value": "http://purl.org/ontology/bibo/status/published" + "@language": "en", + "@value": "Something that acts as or causes Violation of Contractual Obligations" } ], - "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@value": "risk" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], - "http://purl.org/vocab/vann/preferredNamespaceUri": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "https://w3id.org/dpv/risk#" + "@language": "en", + "@value": "Violation of Contractual Obligation" } ], - "http://www.w3.org/2000/01/rdf-schema#Label": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "RISK" + "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0" } + ] + }, + { + "@id": "_:N638499f1a35f4f94abab8a1e6e4bf97d", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2002/07/owl#versionIRI": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/2.1-dev/risk" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2002/07/owl#versionInfo": [ + "https://schema.org/url": [ { - "@value": "2.1-dev" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-n3", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/ns/dx/prof/hasResource": [ - { - "@id": "https://w3id.org/dpv/primer" - }, - { - "@id": "https://w3id.org/dpv/guides" - }, - { - "@id": "https://w3id.org/dpv/examples" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-html" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-rdf" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-ttl" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-n3" - }, + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk#serialisation-jsonld" + "@id": "https://www.w3.org/TeamSubmission/n3/" } ], - "http://www.w3.org/ns/dx/prof/isProfileOf": [ - { - "@id": "http://www.w3.org/2000/01/rdf-schema#" - }, + "http://purl.org/dc/terms/format": [ { - "@id": "http://www.w3.org/2004/02/skos/core#" - }, + "@id": "https://www.iana.org/assignments/media-types/text/n3" + } + ], + "http://purl.org/dc/terms/title": [ { - "@id": "https://w3id.org/dpv" + "@value": "Risk Concepts - N3 serialiation" } ], - "http://xmlns.com/foaf/0.1/logo": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/media/logo.png" + "@id": "https://w3id.org/dpv/risk/risk.n3" } ], - "https://schema.org/version": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@value": "2.1-dev" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseOpportunity", + "@id": "https://w3id.org/dpv/risk#SecurityAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N0e6dade5a2814d0f815e1c5dd41f1c65" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -5976,13 +6345,22 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Opportunity" + "@value": "Something that acts as or causes an attack on security with the aim of undermining it" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5993,28 +6371,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Opportunity" - } - ] - }, - { - "@id": "_:N0e6dade5a2814d0f815e1c5dd41f1c65", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Security Attack" } ] }, { - "@id": "https://w3id.org/dpv/risk#ComponentFailure", + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -6033,13 +6395,22 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Component Failure" + "@value": "Something that acts as or causes Unauthorised Activity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6050,18 +6421,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Component Failure" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of" + "@value": "Unauthorised Activity" } ] }, { - "@id": "https://w3id.org/dpv/risk#BruteForceAuthorisations", + "@id": "https://w3id.org/dpv/risk#Fraud", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -6086,7 +6451,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ned6a23a4f6894305bc5d07abc6872b8e" + "@id": "_:N0328e4baf7504ceb93cd9bbab8b23099" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6101,6 +6466,9 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -6108,7 +6476,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques" + "@value": "Something that acts as or causes Fraud" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6119,28 +6487,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Brute Force Authorisations" + "@value": "Fraud" } ] }, { - "@id": "_:Ned6a23a4f6894305bc5d07abc6872b8e", + "@id": "_:N0328e4baf7504ceb93cd9bbab8b23099", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingLegalObligation", + "@id": "https://w3id.org/dpv/risk#MaliciousCodeAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -6165,7 +6533,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Naf3bb0ebde894641a8c0a69545e7f6cc" + "@id": "_:N625dc3c061c74eec9f96d171c60fd3c0" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6176,18 +6544,27 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Legal Obligations" + "@value": "Something that acts as or causes Malicious Code Attack" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6198,34 +6575,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Legal Obligations" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0" + "@value": "Malicious Code Attack" } ] }, { - "@id": "_:Naf3bb0ebde894641a8c0a69545e7f6cc", + "@id": "_:N625dc3c061c74eec9f96d171c60fd3c0", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#Scam", + "@id": "https://w3id.org/dpv/risk#CompromiseAccount", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -6250,7 +6621,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N498890541a5449e290f0aea406ea5090" + "@id": "_:N252928e4ed0f4c6ea83876f7fb2c3d78" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6266,13 +6637,22 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Scam" + "@value": "Something that acts as or causes a compromised account that is then used by the compromiser" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6283,86 +6663,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Scam" + "@value": "Compromise Account" } ] }, { - "@id": "_:N498890541a5449e290f0aea406ea5090", + "@id": "_:N252928e4ed0f4c6ea83876f7fb2c3d78", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#Discrimination", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Discrimination" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Discrimination" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnwantedDisclosureData", + "@id": "https://w3id.org/dpv/risk#BruteForceAuthorisations", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -6387,7 +6709,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N12b2c9394da44250a5ab771adc23fab8" + "@id": "_:Nb75b090fdcda4ec38e841680681bf642" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6402,6 +6724,12 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -6409,7 +6737,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Disclosure of Data" + "@value": "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6420,28 +6748,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Disclosure of Data" + "@value": "Brute Force Authorisations" } ] }, { - "@id": "_:N12b2c9394da44250a5ab771adc23fab8", + "@id": "_:Nb75b090fdcda4ec38e841680681bf642", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#PhishingScam", + "@id": "https://w3id.org/dpv/risk#ViolatingCodeOfConduct", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -6466,7 +6794,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N2039355de6a7474a8ab35355297e33c6" + "@id": "_:Nb240be91051241df8fe71581eedea8cc" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6477,18 +6805,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Phishing Scam" + "@value": "Something that acts as or causes Violation of Code of Conduct" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6499,50 +6827,39 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Phishing Scam" + "@value": "Violating Code of Conduct" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0" } ] }, { - "@id": "_:N2039355de6a7474a8ab35355297e33c6", + "@id": "_:Nb240be91051241df8fe71581eedea8cc", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#Renumeration", + "@id": "https://w3id.org/dpv/risk#IntentionalMisuse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -6556,13 +6873,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides renumeration which is in monetary or financial form" + "@value": "Intentional Misuse" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6573,12 +6890,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remuneration" + "@value": "Intentional Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk#EquipmentFailure", + "@id": "https://w3id.org/dpv/risk#PersonalSafetyEndangerment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -6603,7 +6920,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nc281053cb7ff4095b5eef42624c4ff46" + "@id": "_:Na783f8da28594e8794173492db9ecac9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6619,13 +6936,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Equipment Failure" + "@value": "Something that acts as or causes Personal Safety Endangerment" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6636,18 +6953,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Equipment Failure" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here equipment refers to physical equipment" + "@value": "Personal Safety Endangerment" } ] }, { - "@id": "_:Nc281053cb7ff4095b5eef42624c4ff46", + "@id": "_:Na783f8da28594e8794173492db9ecac9", "@type": [ "https://schema.org/WebPage" ], @@ -6663,7 +6974,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#LoseTrust", + "@id": "https://w3id.org/dpv/risk#IdentityTheft", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -6688,7 +6999,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nbb93cef662444084828d04948d35895d" + "@id": "_:N33b7660d50a4461e927089957dfd848b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6704,13 +7015,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Trust" + "@value": "Something that acts as or causes Identity Theft" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6721,531 +7035,234 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Trust" + "@value": "Identity Theft" } ] }, { - "@id": "_:Nbb93cef662444084828d04948d35895d", + "@id": "_:N33b7660d50a4461e927089957dfd848b", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk#AccidentalMisuse", + "@id": "https://w3id.org/dpv/risk", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "http://www.w3.org/2002/07/owl#Ontology", + "http://www.w3.org/ns/dx/prof/Profile" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/bibliographicCitation": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@language": "en", - "@value": "accepted" + "@value": "http://www.w3.org/2000/01/rdf-schema" + }, + { + "@value": "http://www.w3.org/2004/02/skos/core" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk#UserRisks" + "@value": "Delaram Golpayegani" + }, + { + "@value": "Fajar Ekaputra" + }, + { + "@value": "Axel Polleres" + }, + { + "@value": "Beatriz Esteves" + }, + { + "@value": "Georg P. Krog" + }, + { + "@value": "Julian Flake" + }, + { + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/created": [ { "@language": "en", - "@value": "Accidental Misuse" + "@value": "2022-08-14" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/dc/terms/creator": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@language": "en", + "@value": "Harshvardhan J. Pandit" + }, + { + "@language": "en", + "@value": "Georg P. Krog" + }, + { + "@language": "en", + "@value": "Paul Ryan" + }, + { + "@language": "en", + "@value": "Rob Brennan" + }, + { + "@language": "en", + "@value": "Delaram Golpayegani" + }, + { + "@language": "en", + "@value": "Beatriz Esteves" + }, + { + "@language": "en", + "@value": "Julian Flake" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/description": [ { "@language": "en", - "@value": "Accidental Misuse" + "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IdentityTheft", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/identifier": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "https://w3id.org/dpv/risk" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/issued": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@language": "en", + "@value": "2022-08-14" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nad476399871e41a5bd37e1133df27770" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Identity Theft" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Identity Theft" - } - ] - }, - { - "@id": "_:Nad476399871e41a5bd37e1133df27770", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#Sabotage", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nddcd9454cd3f48779b8299743d6f1150" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Sabotage" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Sabotage" - } - ] - }, - { - "@id": "_:Nddcd9454cd3f48779b8299743d6f1150", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#UnauthorisedReidentification", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog" - } - ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/license": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@id": "https://www.w3.org/copyright/document-license-2023/" } ], "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Unauthorised Re-Identification" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Re-Identification" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#InterceptCommunications", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-07-13" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/publisher": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@id": "https://www.w3.org/" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N9ba04625c759479eba79e0016163e8e6" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "modified" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Interception of Communications" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Intercept Communications" + "@id": "https://www.w3.org/groups/cg/dpvcg/" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "http://purl.org/dc/terms/title": [ { "@language": "en", - "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N9ba04625c759479eba79e0016163e8e6", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#SocietalRisk", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" + "@value": "Risk Concepts" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/ontology/bibo/doi": [ { - "@language": "en", - "@value": "accepted" + "@value": "10.5281/zenodo.12505841" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/ontology/bibo/status": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@value": "http://purl.org/ontology/bibo/status/published" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/vocab/vann/preferredNamespacePrefix": [ { - "@language": "en", - "@value": "Risks and issues that affect or have the potential to affect society at large or specific groups in society" + "@value": "risk" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/vocab/vann/preferredNamespaceUri": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@value": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/2000/01/rdf-schema#Label": [ { "@language": "en", - "@value": "Societal Risk" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#MaliciousCodeAttack", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N7beef942706b41468112e467b91c5f39" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" + "@value": "RISK" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/2002/07/owl#versionIRI": [ { - "@language": "en", - "@value": "accepted" + "@id": "https://w3id.org/dpv/2.1-dev/risk" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://www.w3.org/2002/07/owl#versionInfo": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@value": "2.1-dev" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/ns/dx/prof/hasResource": [ { - "@language": "en", - "@value": "Something that acts as or causes Malicious Code Attack" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "@id": "https://w3id.org/dpv/primer" + }, { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "@id": "https://w3id.org/dpv/guides" + }, { - "@language": "en", - "@value": "Malicious Code Attack" - } - ] - }, - { - "@id": "_:N7beef942706b41468112e467b91c5f39", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ + "@id": "https://w3id.org/dpv/examples" + }, { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ + "@id": "https://w3id.org/dpv/risk#serialisation-html" + }, { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ViolatingPolicy", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "@id": "https://w3id.org/dpv/risk#serialisation-rdf" + }, { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "@id": "https://w3id.org/dpv/risk#serialisation-ttl" + }, { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "@id": "https://w3id.org/dpv/risk#serialisation-n3" + }, { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#serialisation-jsonld" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/ns/dx/prof/isProfileOf": [ { - "@language": "en", - "@value": "Something that acts as or causes violation of policy which can be either internal or external policy" + "@id": "http://www.w3.org/2000/01/rdf-schema#" + }, + { + "@id": "http://www.w3.org/2004/02/skos/core#" + }, + { + "@id": "https://w3id.org/dpv" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://xmlns.com/foaf/0.1/logo": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/media/logo.png" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/version": [ { - "@language": "en", - "@value": "Violating Policy" + "@value": "2.1-dev" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseCredibility", + "@id": "https://w3id.org/dpv/risk#PsychologicalHarm", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -7270,7 +7287,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N347037135ba54cefae0a2a69a47e52d9" + "@id": "_:N0ddf524630684b719d7f03f907c20cff" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7286,13 +7303,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Credibility" + "@value": "Something that acts as or causes Psychological Harm" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7303,63 +7320,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Credibility" + "@value": "Psychological Harm" } ] }, { - "@id": "_:N347037135ba54cefae0a2a69a47e52d9", + "@id": "_:N0ddf524630684b719d7f03f907c20cff", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#PhysicalHarm", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Physical Harm" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#Terrorism", + "@id": "https://w3id.org/dpv/risk#Benefit", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -7367,13 +7349,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-23" } ], "http://purl.org/dc/terms/modified": [ @@ -7382,11 +7364,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nf6a25073f9274363bcb649fe8540fc70" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -7400,13 +7377,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Terrorism" + "@value": "Something that acts as or causes benefits" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7417,32 +7394,33 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Terrorism" + "@value": "Benefit" } ] }, { - "@id": "_:Nf6a25073f9274363bcb649fe8540fc70", + "@id": "https://w3id.org/dpv/risk#Detriment", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-03-23" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IntentionalMisuse", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -7457,13 +7435,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UserRisks" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Intentional Misuse" + "@value": "Something that acts as or causes Detriment" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7474,12 +7452,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Intentional Misuse" + "@value": "Detriment" } ] }, { - "@id": "https://w3id.org/dpv/risk#Benefit", + "@id": "https://w3id.org/dpv/risk#Payment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -7487,13 +7465,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" + "@value": "2024-04-14" } ], "http://purl.org/dc/terms/modified": [ @@ -7521,7 +7499,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes benefits" + "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7532,12 +7510,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Benefit" + "@value": "Payment" } ] }, { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk", + "@id": "https://w3id.org/dpv/risk#SocietalHealthSafety", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -7556,13 +7534,7 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Risks and issues that arise during operational processes" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7573,17 +7545,34 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Operational Security Risk" + "@value": "Societal Health & Safety" } ] }, { - "@id": "https://w3id.org/dpv/risk#ComponentMalfunction", + "@id": "https://w3id.org/dpv/risk#RightsLimitation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -7597,13 +7586,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Component Malfunction" + "@value": "Something that acts as or causes Limitation of Rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7614,18 +7603,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Component Malfunction" + "@value": "Limitation of Rights" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of" + "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk#Payment", + "@id": "https://w3id.org/dpv/risk#Blackmail", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -7633,13 +7622,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -7648,6 +7637,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N72e00e4999f548eb88bf909311860524" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -7661,13 +7655,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources" + "@value": "Something that acts as or causes Blackmail" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7678,12 +7675,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Payment" + "@value": "Blackmail" } ] }, { - "@id": "https://w3id.org/dpv/risk#Fee", + "@id": "_:N72e00e4999f548eb88bf909311860524", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#PhysicalAssault", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -7691,13 +7704,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -7708,8 +7721,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "DGA 2.10" + "@id": "_:N6b8cf1ee50ba4ea081a101b53baf3bb3" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7720,18 +7732,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides fees e.g. for using a service" + "@value": "Something that acts as or causes Physical Assault" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7742,58 +7754,81 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Fee" + "@value": "Physical Assault" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat", + "@id": "_:N6b8cf1ee50ba4ea081a101b53baf3bb3", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://schema.org/WebPage" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "accepted" + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-ttl", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/turtle/" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://www.iana.org/assignments/media-types/text/turtle" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "Concepts associated with security threats that are likely to originate externally" + "@value": "Risk Concepts - Turtle serialiation" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk/risk.ttl" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "External Security Threat" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk#FinancialImpact", + "@id": "https://w3id.org/dpv/risk#MaterialDamage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-03-30" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -7807,13 +7842,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Things that cause or have the potential to impact financial resources" + "@value": "Something that acts as or causes Material Damage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7824,12 +7859,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Impact" + "@value": "Material Damage" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" } ] }, { - "@id": "https://w3id.org/dpv/risk#CopyrightViolation", + "@id": "https://w3id.org/dpv/risk#EquipmentFailure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -7854,7 +7895,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N73922ea12cd34584b91e209f306167ae" + "@id": "_:N8e86fbf714a04b25a51dfcacec1cb10e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7870,13 +7911,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Copyright Violation" + "@value": "Something that acts as or causes Equipment Failure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7887,28 +7931,34 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Copyright Violation" + "@value": "Equipment Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here equipment refers to physical equipment" } ] }, { - "@id": "_:N73922ea12cd34584b91e209f306167ae", + "@id": "_:N8e86fbf714a04b25a51dfcacec1cb10e", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#CompromiseAccount", + "@id": "https://w3id.org/dpv/risk#Scam", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -7933,7 +7983,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N2ad682e6dc844471903bc2f55f3eaae7" + "@id": "_:Nea270aca30b44f5a8cfda049ee8bf631" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7949,13 +7999,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes a compromised account that is then used by the compromiser" + "@value": "Something that acts as or causes Scam" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7966,54 +8019,62 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account" + "@value": "Scam" } ] }, { - "@id": "_:N2ad682e6dc844471903bc2f55f3eaae7", + "@id": "_:Nea270aca30b44f5a8cfda049ee8bf631", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#ErroneousSystemUse", + "@id": "https://w3id.org/dpv/risk#serialisation-html", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://www.w3.org/TR/html/" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/format": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/title": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "Risk Concepts - HTML serialiation" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.html" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "_:Ne874eff2b0f74da79392c36cf77d71f1" + "@id": "http://www.w3.org/ns/dx/prof/role/specification" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IndividualRisk", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -8026,15 +8087,10 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#UserRisks" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Erroneous System Use" + "@value": "Risks and issues that affect or have the potential to affect specific individuals" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8045,28 +8101,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Erroneous System Use" - } - ] - }, - { - "@id": "_:Ne874eff2b0f74da79392c36cf77d71f1", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Individual Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#VulnerabilityCreated", + "@id": "https://w3id.org/dpv/risk#RightsViolation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -8074,13 +8114,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://purl.org/dc/terms/modified": [ @@ -8089,11 +8129,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nc0018c079b6b42619d869b3ae63ec70a" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -8107,13 +8142,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#InternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Vulnerability Created" + "@value": "Something that acts as or causes Violation of Rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8124,28 +8159,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Vulnerability Created" - } - ] - }, - { - "@id": "_:Nc0018c079b6b42619d869b3ae63ec70a", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Violation of Rights" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk#IdentityFraud", + "@id": "https://w3id.org/dpv/risk#DataBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -8170,7 +8195,15 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nbc1a7f7ae94c4fde84913e9622b759f6" + "@id": "_:N0353966748ad43cc9b9c03081ec6b6f9" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples#E0069" + }, + { + "@id": "https://w3id.org/dpv/examples#E0071" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8186,13 +8219,22 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#SecurityBreach" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Identity Fraud" + "@value": "Something that acts as or causes Data Breach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8203,28 +8245,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identity Fraud" + "@value": "Data Breach" } ] }, { - "@id": "_:Nbc1a7f7ae94c4fde84913e9622b759f6", + "@id": "_:N0353966748ad43cc9b9c03081ec6b6f9", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedDataModification", + "@id": "https://w3id.org/dpv/risk#MalwareAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -8249,7 +8291,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Naa83e8f3fb5e4e9a88398292112d68f3" + "@id": "_:N6fb9cc1510c4401a9c582949b7a8c8b7" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8264,6 +8306,15 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -8271,7 +8322,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Modification" + "@value": "Something that acts as or causes Malware Attack" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8282,33 +8333,55 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Modification" + "@value": "Malware Attack" } ] }, { - "@id": "_:Naa83e8f3fb5e4e9a88398292112d68f3", + "@id": "_:N6fb9cc1510c4401a9c582949b7a8c8b7", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity", + "@id": "https://w3id.org/dpv/risk#DenialServiceAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N8705162a41ca472c9e3867ec5902de25" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -8321,6 +8394,9 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -8328,7 +8404,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Activity" + "@value": "Something that acts as or causes Denial of Service Attack (DoS)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8339,7 +8415,23 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Activity" + "@value": "Denial of Service Attack (DoS)" + } + ] + }, + { + "@id": "_:N8705162a41ca472c9e3867ec5902de25", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" } ] } diff --git a/2.1-dev/risk/modules/risk_consequences.n3 b/2.1-dev/risk/modules/risk_consequences.n3 index b23e5df5b..87558834f 100644 --- a/2.1-dev/risk/modules/risk_consequences.n3 +++ b/2.1-dev/risk/modules/risk_consequences.n3 @@ -36,7 +36,9 @@ risk:AuthorisationFailure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Authorisation Failure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Authorisation Failure"@en . @@ -46,7 +48,8 @@ risk:AvailabilityBreach a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:DataBreach ; + skos:broader risk:AvailabilityConcept, + risk:DataBreach ; skos:inScheme risk:risk-consequences-classes . risk:Benefit a rdfs:Class, @@ -73,7 +76,8 @@ risk:Blackmail a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Blackmail"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Blackmail"@en . @@ -89,7 +93,9 @@ risk:BruteForceAuthorisations a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Brute Force Authorisations"@en . @@ -105,7 +111,8 @@ risk:Coercion a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Coercion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Coercion"@en . @@ -128,7 +135,8 @@ risk:ComponentFailure a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Component Failure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Component Failure"@en ; @@ -139,7 +147,8 @@ risk:ComponentMalfunction a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Component Malfunction"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Component Malfunction"@en ; @@ -156,7 +165,10 @@ risk:CompromiseAccount a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Compromise Account"@en . @@ -172,7 +184,8 @@ risk:CompromiseAccountCredentials a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:ConfidentialityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Compromise Account Credentials"@en . @@ -188,7 +201,8 @@ risk:ConfidentialityBreach a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:DataBreach ; + skos:broader risk:ConfidentialityConcept, + risk:DataBreach ; skos:definition "Something that acts as or causes Confidentiality Breach"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Confidentiality Breach"@en . @@ -220,7 +234,8 @@ risk:Cryptojacking a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Cryptojacking"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Cryptojacking"@en . @@ -251,7 +266,10 @@ risk:DataBreach a rdfs:Class, dex:E0071 ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SecurityBreach ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:SecurityBreach ; skos:definition "Something that acts as or causes Data Breach"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Data Breach"@en . @@ -267,7 +285,8 @@ risk:DataCorruption a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:IntegrityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Corruption of Data"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Data Corruption"@en ; @@ -280,14 +299,12 @@ risk:DenialServiceAttack a rdfs:Class, dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ], - [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Denial of Service Attack (DoS)"@en . @@ -329,7 +346,8 @@ risk:DistributedDenialServiceAttack a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en . @@ -355,7 +373,8 @@ risk:EquipmentFailure a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Equipment Failure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Equipment Failure"@en ; @@ -372,7 +391,8 @@ risk:EquipmentMalfunction a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Equipment Malfunction"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Equipment Malfunction"@en ; @@ -432,7 +452,8 @@ risk:Extorsion a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Extorsion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Extorsion"@en . @@ -488,7 +509,8 @@ risk:Fraud a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Fraud"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Fraud"@en . @@ -534,7 +556,8 @@ risk:IdentityFraud a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:ConfidentialityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Identity Fraud"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Identity Fraud"@en . @@ -550,7 +573,8 @@ risk:IdentityTheft a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:ConfidentialityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Identity Theft"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Identity Theft"@en . @@ -610,7 +634,8 @@ risk:IntegrityBreach a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:DataBreach ; + skos:broader risk:DataBreach, + risk:IntegrityConcept ; skos:inScheme risk:risk-consequences-classes . risk:IntentionalMisuse a rdfs:Class, @@ -634,22 +659,13 @@ risk:InterceptCommunications a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Interception of Communications"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Intercept Communications"@en ; skos:scopeNote "This concept was called \"InterceptionCommunications\" in DPV 2.0"@en . -risk:InternalSecurityThreat a rdfs:Class, - skos:Concept, - dpv:RiskConcept ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader dpv:RiskConcept ; - skos:definition "Concepts associated with security threats and issues that originate within the organisation"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Internal Security Threat"@en . - risk:JudicialCosts a rdfs:Class, skos:Concept, dpv:RiskConcept ; @@ -803,7 +819,10 @@ risk:MaliciousCodeAttack a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Malicious Code Attack"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Malicious Code Attack"@en . @@ -819,7 +838,10 @@ risk:MalwareAttack a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Malware Attack"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Malware Attack"@en . @@ -915,7 +937,8 @@ risk:PhishingScam a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Phishing Scam"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Phishing Scam"@en . @@ -994,7 +1017,8 @@ risk:Reidentification a rdfs:Class, dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:ConfidentialityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Re-identification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Re-identification"@en ; @@ -1107,7 +1131,9 @@ risk:Sabotage a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Sabotage"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Sabotage"@en . @@ -1123,7 +1149,8 @@ risk:Scam a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Scam"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Scam"@en . @@ -1133,7 +1160,10 @@ risk:SecurityAttack a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Security Attack"@en . @@ -1149,7 +1179,10 @@ risk:SecurityBreach a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Security Breach"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Security Breach"@en . @@ -1216,7 +1249,9 @@ risk:Spoofing a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat, + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept, risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Spoofing"@en ; skos:inScheme risk:risk-consequences-classes ; @@ -1233,7 +1268,8 @@ risk:SystemFailure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes System Failure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "System Failure"@en ; @@ -1250,7 +1286,10 @@ risk:SystemIntrusion a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes System Intrusion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "System Intrusion"@en . @@ -1266,7 +1305,8 @@ risk:SystemMalfunction a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes System Malfunction"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "System Malfunction"@en ; @@ -1299,7 +1339,10 @@ risk:UnauthorisedAccesstoPremises a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Access to Premises"@en . @@ -1309,7 +1352,10 @@ risk:UnauthorisedActivity a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised Activity"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Activity"@en . @@ -1325,7 +1371,9 @@ risk:UnauthorisedCodeAccess a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised Code Access"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Code Access"@en . @@ -1341,7 +1389,8 @@ risk:UnauthorisedCodeDisclosure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Code Disclosure"@en . @@ -1357,7 +1406,8 @@ risk:UnauthorisedCodeModification a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Code Modification"@en . @@ -1373,7 +1423,8 @@ risk:UnauthorisedDataAccess a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Data Access"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Data Access"@en . @@ -1389,7 +1440,8 @@ risk:UnauthorisedDataDisclosure a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Data Disclosure"@en . @@ -1405,7 +1457,8 @@ risk:UnauthorisedDataModification a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Data Modification"@en . @@ -1421,7 +1474,8 @@ risk:UnauthorisedInformationDisclosure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Information Disclosure"@en . @@ -1434,7 +1488,8 @@ risk:UnauthorisedReidentification a rdfs:Class, dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Re-Identification"@en . @@ -1450,7 +1505,8 @@ risk:UnauthorisedResourceUse a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Resource Use"@en . @@ -1466,7 +1522,9 @@ risk:UnauthorisedSystemAccess a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised System Access"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised System Access"@en . @@ -1482,7 +1540,8 @@ risk:UnauthorisedSystemModification a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised System Modification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised System Modification"@en . @@ -1498,7 +1557,9 @@ risk:UnwantedCodeDeletion a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unwanted Code Deletion"@en . @@ -1514,7 +1575,9 @@ risk:UnwantedDataDeletion a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unwanted Data Deletion"@en . @@ -1530,7 +1593,8 @@ risk:UnwantedDisclosureData a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unwanted Disclosure of Data"@en . @@ -1657,22 +1721,6 @@ risk:ViolenceAgainstChildren a rdfs:Class, skos:prefLabel "Violence against children"@en ; skos:scopeNote "This concept was called \"ChildViolence\" in DPV 2.0"@en . -risk:VulnerabilityCreated a rdfs:Class, - skos:Concept, - dpv:RiskConcept ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:modified "2024-08-16"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:InternalSecurityThreat ; - skos:definition "Something that acts as or causes Vulnerability Created"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Vulnerability Created"@en . - a owl:Ontology, profile:Profile ; dct:bibliographicCitation "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" ; diff --git a/2.1-dev/risk/modules/risk_consequences.rdf b/2.1-dev/risk/modules/risk_consequences.rdf index 4b756e8b0..0e164a9c5 100644 --- a/2.1-dev/risk/modules/risk_consequences.rdf +++ b/2.1-dev/risk/modules/risk_consequences.rdf @@ -12,14 +12,26 @@ xmlns:sw="http://www.w3.org/2003/06/sw-vocab-status/ns#" xmlns:vann="http://purl.org/vocab/vann/" > - + - Physical Assault - Something that acts as or causes Physical Assault - - + Judicial Costs + Something that involves or causes judicial costs to be paid + + accepted + + + + + + + + Blackmail + Something that acts as or causes Blackmail + + + 2022-08-17 2024-08-16 accepted @@ -27,73 +39,80 @@ - + - Lose of Negotiating Capacity - Something that acts as or causes Loss of Negotiating Capacity - - + Violation of Contractual Obligation + Something that acts as or causes Violation of Contractual Obligations + + This concept was called "ViolationContractualObligations" in DPV 2.0 + 2022-08-17 2024-08-16 - accepted + modified Harshvardhan J. Pandit - + - Remuneration - Something that acts as or provides renumeration which is in monetary or financial form + Fee + Something that acts as or provides fees e.g. for using a service + DGA 2.10 2024-04-14 2024-08-16 - accepted + modified Georg P. Krog, Harshvardhan J. Pandit - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - + - Social Disadvantage - Something that acts as or causes Social Disadvantage - - 2022-08-19 - 2024-08-16 + Component Malfunction + Something that acts as or causes Component Malfunction + + + Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of accepted - Georg P. Krog - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - Societal Risk - Risks and issues that affect or have the potential to affect society at large or specific groups in society - + Identity Fraud + Something that acts as or causes Identity Fraud + + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - Lose of Reputation - Something that acts as or causes Loss of Reputation - - + Cryptojacking + Something that acts as or causes Cryptojacking + + + 2022-08-17 2024-08-16 accepted @@ -101,14 +120,15 @@ - + - Phishing Scam - Something that acts as or causes Phishing Scam + Distributed Denial of Service Attack (DDoS) + Something that acts as or causes Distributed Denial of Service Attack (DDoS) + - + 2022-08-17 2024-08-16 accepted @@ -116,24 +136,33 @@ - + - Physical Harm - + Re-identification + Something that acts as or causes Re-identification + + + Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification + 2022-08-19 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - Compromise Account Credentials - Something that acts as or causes Account Credentials to be compromised - - + Unauthorised Access to Premises + Something that acts as or causes Unauthorised Access to Premises + + + + + 2022-08-17 2024-08-16 accepted @@ -141,38 +170,32 @@ - + - System Failure - Something that acts as or causes System Failure + Data Corruption + Something that acts as or causes Corruption of Data + - Here system refers to both hardware and software systems - + This concept was called "Corruption Data" in DPV 2.0 + 2022-08-17 2024-08-16 - accepted + modified Harshvardhan J. Pandit - - - - - - - Risk Concepts - HTML serialiation - - + - Unwanted Data Deletion - Something that acts as or causes Unwanted Data Deletion + Unauthorised Data Access + Something that acts as or causes Unauthorised Data Access + - + 2022-08-17 2024-08-16 accepted @@ -180,14 +203,16 @@ - + - Sabotage - Something that acts as or causes Sabotage - - + Equipment Malfunction + Something that acts as or causes Equipment Malfunction + + + Here equipment refers to physical equipment + 2022-08-17 2024-08-16 accepted @@ -195,65 +220,65 @@ - + - Sexual Violence - Something that acts as or causes Sexual Violence - - - 2022-08-17 - 2024-08-16 + Financial Impact + Things that cause or have the potential to impact financial resources + accepted - Harshvardhan J. Pandit - + - Violence against children - Something that acts as or causes Child Violence - - This concept was called "ChildViolence" in DPV 2.0 - - 2022-08-17 + Damage + Something that acts as or causes Damage + + 2022-03-30 2024-08-16 accepted Harshvardhan J. Pandit - + - Personal Safety Endangerment - Something that acts as or causes Personal Safety Endangerment + Discrimination + Something that acts as or causes Discrimination - - 2022-08-17 + 2022-08-19 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + + Operational Security Risk + Risks and issues that arise during operational processes + + accepted + + - + - Fraud - Something that acts as or causes Fraud + Unauthorised Code Modification + Something that acts as or causes Unauthorised Code Modification + - + 2022-08-17 2024-08-16 accepted @@ -261,86 +286,80 @@ - + - Data Breach - Something that acts as or causes Data Breach - - + Violation of Legal Obligations + Something that acts as or causes Violation of Legal Obligations + + This concept was called "ViolationRegulatoryObligations" in DPV 2.0 + 2022-08-17 2024-08-16 - accepted + modified Harshvardhan J. Pandit - - - + ENISA Reference Incident Classification Taxonomy 2018 https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - Material Damage - Something that acts as or causes Material Damage - - The criteria for what is considered material damage is based in jurisdictional laws and norms - 2022-03-30 + Exposure to Harmful Speech + Something that acts as or causes Harmful Speech + + This concept was called "HarmfulSpeech" in DPV 2.0 + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - Unauthorised Activity - Something that acts as or causes Unauthorised Activity - + System Failure + Something that acts as or causes System Failure + + + Here system refers to both hardware and software systems + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - Detriment - Something that acts as or causes Detriment - - 2022-03-23 - 2024-08-16 + Privacy + accepted - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves - - - ENISA Threat Landscape for Ransomware Attacks 2022 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - - + - Copyright Violation - Something that acts as or causes Copyright Violation - - + Brute Force Authorisations + Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques + + + + 2022-08-17 2024-08-16 accepted @@ -348,71 +367,66 @@ - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - + - Societal Health & Safety - + Sabotage + Something that acts as or causes Sabotage + + + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - Violation of Statutory Obligations - Something that acts as or causes Violation of Statutory Obligations - - This concept was called "ViolationStatutoryObligations" in DPV 2.0 - + Unauthorised Code Disclosure + Something that acts as or causes Unauthorised Code Disclosure + + + 2022-08-17 2024-08-16 - modified + accepted Harshvardhan J. Pandit - + - Violation of Contractual Obligation - Something that acts as or causes Violation of Contractual Obligations - - This concept was called "ViolationContractualObligations" in DPV 2.0 - + Violence against children + Something that acts as or causes Child Violence + + This concept was called "ChildViolence" in DPV 2.0 + 2022-08-17 2024-08-16 - modified + accepted Harshvardhan J. Pandit - + - Cryptojacking - Something that acts as or causes Cryptojacking + System Intrusion + Something that acts as or causes System Intrusion + + + - + 2022-08-17 2024-08-16 accepted @@ -420,14 +434,20 @@ - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - Lose of Goodwill - Something that acts as or causes Loss of Goodwill - - + Unwanted Disclosure of Data + Something that acts as or causes Unwanted Disclosure of Data + + + 2022-08-17 2024-08-16 accepted @@ -435,114 +455,180 @@ - + - Violating Policy - Something that acts as or causes violation of policy which can be either internal or external policy - + Misuse + Something that acts as or causes Misuse + + 2024-06-11 + 2024-08-16 accepted + Delaram Golpayegani - + + + + + + Risk Concepts + http://purl.org/ontology/bibo/status/published + RISK + Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management + 2022-08-14 + 2022-08-14 + 2024-07-13 + Harshvardhan J. Pandit + Georg P. Krog + Paul Ryan + Rob Brennan + Delaram Golpayegani + Beatriz Esteves + Julian Flake + 2.1-dev + 2.1-dev + https://w3id.org/dpv/risk + http://www.w3.org/2000/01/rdf-schema + http://www.w3.org/2004/02/skos/core + 10.5281/zenodo.12505841 + Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 + + + Delaram Golpayegani + Fajar Ekaputra + Axel Polleres + Beatriz Esteves + Georg P. Krog + Julian Flake + Harshvardhan J. Pandit + + risk + https://w3id.org/dpv/risk# + + + + + + + + + + + + + - External Security Threat - Concepts associated with security threats that are likely to originate externally - + Benefit + Something that acts as or causes benefits + + 2022-03-23 + 2024-08-16 accepted + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres - + - Lose of Opportunity - Something that acts as or causes Loss of Opportunity - - + Intercept Communications + Something that acts as or causes Interception of Communications + + + This concept was called "InterceptionCommunications" in DPV 2.0 + 2022-08-17 2024-08-16 - accepted + modified Harshvardhan J. Pandit - + - Component Malfunction - Something that acts as or causes Component Malfunction - - Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of + Lose of Opportunity + Something that acts as or causes Loss of Opportunity + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - Identity Fraud - Something that acts as or causes Identity Fraud - - - 2022-08-17 - 2024-08-16 + + accepted - Harshvardhan J. Pandit - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - Unwanted Disclosure of Data - Something that acts as or causes Unwanted Disclosure of Data - - - 2022-08-17 + Harm + Something that acts as or causes Harm to humans + + This concept refers to the general abstract notion of harm + 2022-08-13 2024-08-16 accepted Harshvardhan J. Pandit - + - Payment - Something that acts as or provides payment e.g. to access a service or purchase resources - - 2024-04-14 + Data Breach + Something that acts as or causes Data Breach + + + + + + 2022-08-17 2024-08-16 accepted - Georg P. Krog, Harshvardhan J. Pandit + Harshvardhan J. Pandit + + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - Impact to Rights - Something that acts as or causes Impact to Rights - - - This concept was called "ImpactToRights" in DPV 2.0 - + Extorsion + Something that acts as or causes Extorsion + + + 2022-08-17 2024-08-16 accepted @@ -550,65 +636,56 @@ - + - Violation of Legal Obligations - Something that acts as or causes Violation of Legal Obligations - - This concept was called "ViolationRegulatoryObligations" in DPV 2.0 - + Financial Loss + Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity + + 2022-08-17 2024-08-16 - modified + accepted Harshvardhan J. Pandit - - - - - - - Risk Concepts - Turtle serialiation - - + - Unauthorised Code Access - Something that acts as or causes Unauthorised Code Access - - - 2022-08-17 - 2024-08-16 + Intentional Misuse + Intentional Misuse + accepted - Harshvardhan J. Pandit - + - Reputational Risk - Risks and issues that affect the reputation of the organisation - + Lose of Trust + Something that acts as or causes Loss of Trust + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - Violating Code of Conduct - Something that acts as or causes Violation of Code of Conduct + Violating Ethics Code + Something that acts as or causes Violation of Ethics Code - This concept was called "ViolationCodeConduct" in DPV 2.0 - + This concept was called "ViolationEthicalCode" in DPV 2.0 + 2022-08-17 2024-08-16 modified @@ -616,96 +693,85 @@ - + - Human Errors - Something that acts as or causes Human Errors - - - 2022-08-17 - 2024-08-16 - accepted - Harshvardhan J. Pandit - - - - - - - - Re-identification - Something that acts as or causes Re-identification - - Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification - 2022-08-19 + Unauthorised Data Disclosure + Something that acts as or causes Unauthorised Data Disclosure + + + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISa Trust Services Security Incidents 2021 + https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 - + - Intercept Communications - Something that acts as or causes Interception of Communications - - This concept was called "InterceptionCommunications" in DPV 2.0 - + Compromise Account Credentials + Something that acts as or causes Account Credentials to be compromised + + + 2022-08-17 2024-08-16 - modified + accepted Harshvardhan J. Pandit - + - Public Order Breach - Something that acts as or causes Public Order Breach + Detriment + Something that acts as or causes Detriment - - 2022-08-17 + 2022-03-23 2024-08-16 accepted - Harshvardhan J. Pandit + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves - + - Financial Impact - Things that cause or have the potential to impact financial resources - + Psychological Harm + Something that acts as or causes Psychological Harm + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + - Malicious Code Attack - Something that acts as or causes Malicious Code Attack - - + Personal Safety Endangerment + Something that acts as or causes Personal Safety Endangerment + + 2022-08-17 2024-08-16 accepted @@ -713,14 +779,14 @@ - + - Security Breach - Something that acts as or causes Security Breach - - + Injury + Something that acts as or causes Injury + + 2022-08-17 2024-08-16 accepted @@ -728,14 +794,14 @@ - + - Confidentiality Breach - Something that acts as or causes Confidentiality Breach - - + Copyright Violation + Something that acts as or causes Copyright Violation + + 2022-08-17 2024-08-16 accepted @@ -743,19 +809,20 @@ - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - Identity Theft - Something that acts as or causes Identity Theft - - + Unauthorised Data Modification + Something that acts as or causes Unauthorised Data Modification + + + 2022-08-17 2024-08-16 accepted @@ -763,44 +830,46 @@ - + - Damage - Something that acts as or causes Damage - - 2022-03-30 + Lose of Reputation + Something that acts as or causes Loss of Reputation + + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - Limitation of Rights - Something that acts as or causes Limitation of Rights - - This concept was called "LimitationOfRights" in DPV 2.0 - 2022-08-18 + Confidentiality Breach + Something that acts as or causes Confidentiality Breach + + + + 2022-08-17 2024-08-16 accepted - Georg P. Krog, Harshvardhan J. Pandit + Harshvardhan J. Pandit - + - Equipment Failure - Something that acts as or causes Equipment Failure - - Here equipment refers to physical equipment - + Fraud + Something that acts as or causes Fraud + + + 2022-08-17 2024-08-16 accepted @@ -808,19 +877,26 @@ - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - Unauthorised Data Disclosure - Something that acts as or causes Unauthorised Data Disclosure + Unwanted Data Deletion + Something that acts as or causes Unwanted Data Deletion + + - + 2022-08-17 2024-08-16 accepted @@ -843,28 +919,33 @@ - + - Unauthorised Re-Identification - Something that acts as or causes Unauthorised Re-Identification - - 2022-08-19 + Compromise Account + Something that acts as or causes a compromised account that is then used by the compromiser + + + + + + 2022-08-17 2024-08-16 accepted - Georg P. Krog + Harshvardhan J. Pandit - + - Financial Loss - Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity - - + Denial of Service Attack (DoS) + Something that acts as or causes Denial of Service Attack (DoS) + + + 2022-08-17 2024-08-16 accepted @@ -872,14 +953,14 @@ - + - Erroneous System Use - Something that acts as or causes Erroneous System Use - - + Public Order Breach + Something that acts as or causes Public Order Breach + + 2022-08-17 2024-08-16 accepted @@ -887,30 +968,22 @@ - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - + - Exposure to Harmful Speech - Something that acts as or causes Harmful Speech - - This concept was called "HarmfulSpeech" in DPV 2.0 - + Malicious Code Attack + Something that acts as or causes Malicious Code Attack + + + + + 2022-08-17 2024-08-16 accepted @@ -918,164 +991,57 @@ - - - - - Judicial Costs - Something that involves or causes judicial costs to be paid - - accepted - - - - + - Coercion - Something that acts as or causes Coercion - - - 2022-08-17 - 2024-08-16 + Reputational Risk + Risks and issues that affect the reputation of the organisation + accepted - Harshvardhan J. Pandit - - - - - - Risk Concepts - http://purl.org/ontology/bibo/status/published - RISK - Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management - 2022-08-14 - 2022-08-14 - 2024-07-13 - Harshvardhan J. Pandit - Georg P. Krog - Paul Ryan - Rob Brennan - Delaram Golpayegani - Beatriz Esteves - Julian Flake - 2.1-dev - 2.1-dev - https://w3id.org/dpv/risk - http://www.w3.org/2000/01/rdf-schema - http://www.w3.org/2004/02/skos/core - 10.5281/zenodo.12505841 - Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 - - - Harshvardhan J. Pandit - Georg P. Krog - Beatriz Esteves - Axel Polleres - Fajar Ekaputra - Delaram Golpayegani - Julian Flake - - risk - https://w3id.org/dpv/risk# - - - - - - - - - - - - - - - - - Guides for Data Privacy Vocabulary - - - - + - Malware Attack - Something that acts as or causes Malware Attack + Security Attack + Something that acts as or causes an attack on security with the aim of undermining it + + + - - 2022-08-17 - 2024-08-16 accepted - Harshvardhan J. Pandit - - - - - Examples for Data Privacy Vocabulary - - - - + - Legal Risk - Risks and issues that have their basis in legal requirements and enforcement + External Security Threat + Concepts associated with security threats that are likely to originate externally accepted - - - - - Violating Ethics Code - Something that acts as or causes Violation of Ethics Code - - This concept was called "ViolationEthicalCode" in DPV 2.0 - - 2022-08-17 - 2024-08-16 - modified - Harshvardhan J. Pandit - - - - + - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - - - Judicial Penalty - Something that involves or causes judicial penalties to be paid - - accepted - - + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - Injury - Something that acts as or causes Injury - - + Unwanted Code Deletion + Something that acts as or causes Unwanted Code Deletion + + + + 2022-08-17 2024-08-16 accepted @@ -1083,14 +1049,14 @@ - + - Authorisation Failure - Something that acts as or causes Authorisation Failure - - + Lose of Credibility + Something that acts as or causes Loss of Credibility + + 2022-08-17 2024-08-16 accepted @@ -1098,14 +1064,15 @@ - + - Lose of Trust - Something that acts as or causes Loss of Trust - - + Coercion + Something that acts as or causes Coercion + + + 2022-08-17 2024-08-16 accepted @@ -1113,62 +1080,73 @@ - - - - - Primer for Data Privacy Vocabulary - - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - Unauthorised Information Disclosure - Something that acts as or causes Unauthorised Information Disclosure - - + Violation of Statutory Obligations + Something that acts as or causes Violation of Statutory Obligations + + This concept was called "ViolationStatutoryObligations" in DPV 2.0 + 2022-08-17 2024-08-16 - accepted + modified Harshvardhan J. Pandit - + + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - - Prevent Exercising of Rights - Something that acts as or causes Prevent Exercising of Rights - - This concept was called "PreventExercisingOfRights" in DPV 2.0 - 2022-08-18 - 2024-08-16 + + Component Failure + Something that acts as or causes Component Failure + + + Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of accepted - Georg P. Krog, Harshvardhan J. Pandit - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - Lose of Customer Confidence - Something that acts as or causes Loss of Customer Confidence + Lose of Negotiating Capacity + Something that acts as or causes Loss of Negotiating Capacity - + 2022-08-17 2024-08-16 accepted @@ -1176,35 +1154,31 @@ - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - User Risks - Concepts associated with risks that arise due to User or Human use - + Erroneous System Use + Something that acts as or causes Erroneous System Use + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - Unauthorised Access to Premises - Something that acts as or causes Unauthorised Access to Premises - - + System Malfunction + Something that acts as or causes System Malfunction + + + Here system refers to both hardware and software systems + 2022-08-17 2024-08-16 accepted @@ -1212,14 +1186,20 @@ - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - Extorsion - Something that acts as or causes Extorsion + Phishing Scam + Something that acts as or causes Phishing Scam + - + 2022-08-17 2024-08-16 accepted @@ -1227,28 +1207,30 @@ - + - Benefit - Something that acts as or causes benefits - - 2022-03-23 + Illegal Data Processing + Something that acts as or causes Illegal Processing of Data + + This concept was called "IllegalProcessingData" in DPV 2.0 + + 2022-08-17 2024-08-16 accepted - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres + Harshvardhan J. Pandit - + - Distributed Denial of Service Attack (DDoS) - Something that acts as or causes Distributed Denial of Service Attack (DDoS) - - + Lose of Customer Confidence + Something that acts as or causes Loss of Customer Confidence + + 2022-08-17 2024-08-16 accepted @@ -1256,67 +1238,53 @@ - + - Lose of Credibility - Something that acts as or causes Loss of Credibility - - + Violating Code of Conduct + Something that acts as or causes Violation of Code of Conduct + + This concept was called "ViolationCodeConduct" in DPV 2.0 + 2022-08-17 2024-08-16 - accepted + modified Harshvardhan J. Pandit - + - Compromise Account - Something that acts as or causes a compromised account that is then used by the compromiser - - - 2022-08-17 - 2024-08-16 + Societal Health & Safety + accepted - Harshvardhan J. Pandit - - - ENISA Threat Landscape 2021 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 - - + - Spoofing - Something that acts as or causes Spoofing - - - - - 2022-08-17 - 2024-08-16 + Judicial Penalty + Something that involves or causes judicial penalties to be paid + accepted - Harshvardhan J. Pandit - + - Illegal Data Processing - Something that acts as or causes Illegal Processing of Data - - This concept was called "IllegalProcessingData" in DPV 2.0 - + Unauthorised Code Access + Something that acts as or causes Unauthorised Code Access + + + + 2022-08-17 2024-08-16 accepted @@ -1324,19 +1292,22 @@ - + - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - Psychological Harm - Something that acts as or causes Psychological Harm - - + Security Breach + Something that acts as or causes Security Breach + + + + + 2022-08-17 2024-08-16 accepted @@ -1344,20 +1315,16 @@ - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - + - Denial of Service Attack (DoS) - Something that acts as or causes Denial of Service Attack (DoS) - - - + Impact to Rights + Something that acts as or causes Impact to Rights + + + This concept was called "ImpactToRights" in DPV 2.0 + 2022-08-17 2024-08-16 accepted @@ -1371,8 +1338,9 @@ Scam Something that acts as or causes Scam + - + 2022-08-17 2024-08-16 accepted @@ -1380,30 +1348,37 @@ - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + + + + Risk Concepts - N3 serialiation - + - Privacy - + Social Disadvantage + Something that acts as or causes Social Disadvantage + + 2022-08-19 + 2024-08-16 accepted + Georg P. Krog - + - System Malfunction - Something that acts as or causes System Malfunction + Identity Theft + Something that acts as or causes Identity Theft + - Here system refers to both hardware and software systems - + 2022-08-17 2024-08-16 accepted @@ -1411,27 +1386,17 @@ - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - - - - - - Risk Concepts - JSON-LD serialiation - - + - Vulnerability Created - Something that acts as or causes Vulnerability Created - - + Malware Attack + Something that acts as or causes Malware Attack + + + + + 2022-08-17 2024-08-16 accepted @@ -1439,14 +1404,40 @@ - + - Blackmail - Something that acts as or causes Blackmail - - + Payment + Something that acts as or provides payment e.g. to access a service or purchase resources + + 2024-04-14 + 2024-08-16 + accepted + Georg P. Krog, Harshvardhan J. Pandit + + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + + Authorisation Failure + Something that acts as or causes Authorisation Failure + + + + 2022-08-17 2024-08-16 accepted @@ -1454,16 +1445,27 @@ - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - + Terrorism + Something that acts as or causes Terrorism + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html @@ -1476,39 +1478,35 @@ Risk Concepts - RDF/XML serialiation - - - - - Unauthorised Data Access - Something that acts as or causes Unauthorised Data Access - - - 2022-08-17 - 2024-08-16 - accepted - Harshvardhan J. Pandit - - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - + Violating Policy + Something that acts as or causes violation of policy which can be either internal or external policy + accepted - + - Equipment Malfunction - Something that acts as or causes Equipment Malfunction - - Here equipment refers to physical equipment - + Lose of Goodwill + Something that acts as or causes Loss of Goodwill + + 2022-08-17 2024-08-16 accepted @@ -1516,70 +1514,45 @@ - + - Unauthorised System Modification - Something that acts as or causes Unauthorised System Modification - - - 2022-08-17 + Limitation of Rights + Something that acts as or causes Limitation of Rights + + This concept was called "LimitationOfRights" in DPV 2.0 + 2022-08-18 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog, Harshvardhan J. Pandit - + - Unwanted Code Deletion - Something that acts as or causes Unwanted Code Deletion - - - 2022-08-17 + Violation of Rights + Something that acts as or causes Violation of Rights + + This concept was called "ViolationOfRights" in DPV 2.0 + 2022-08-18 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog, Harshvardhan J. Pandit - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - + - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - - - Unauthorised System Access - Something that acts as or causes Unauthorised System Access - - - 2022-08-17 - 2024-08-16 - accepted - Harshvardhan J. Pandit - - + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view @@ -1587,8 +1560,9 @@ Unauthorised Resource Use Something that acts as or causes Unauthorised Resource Use + - + 2022-08-17 2024-08-16 accepted @@ -1596,14 +1570,28 @@ - + + + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - Unauthorised Data Modification - Something that acts as or causes Unauthorised Data Modification + Spoofing + Something that acts as or causes Spoofing + + - + + + 2022-08-17 2024-08-16 accepted @@ -1611,28 +1599,33 @@ - + - Unauthorised Code Modification - Something that acts as or causes Unauthorised Code Modification - - - 2022-08-17 + Remuneration + Something that acts as or provides renumeration which is in monetary or financial form + + 2024-04-14 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog, Harshvardhan J. Pandit - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - Discrimination - Something that acts as or causes Discrimination - + Unauthorised Re-Identification + Something that acts as or causes Unauthorised Re-Identification + + 2022-08-19 2024-08-16 accepted @@ -1640,72 +1633,56 @@ - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - Individual Health & Safety - + Societal Risk + Risks and issues that affect or have the potential to affect society at large or specific groups in society + accepted - + - Reward - Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee - - 2024-04-14 - 2024-08-16 + Accidental Misuse + Accidental Misuse + accepted - Georg P. Krog, Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - - - - - Risk Concepts - N3 serialiation - - + - Intentional Misuse - Intentional Misuse - + + accepted - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - Unauthorised Code Disclosure - Something that acts as or causes Unauthorised Code Disclosure - - + Sexual Violence + Something that acts as or causes Sexual Violence + + 2022-08-17 2024-08-16 accepted @@ -1713,19 +1690,25 @@ - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - System Intrusion - Something that acts as or causes System Intrusion + Unauthorised Information Disclosure + Something that acts as or causes Unauthorised Information Disclosure + - + 2022-08-17 2024-08-16 accepted @@ -1733,57 +1716,50 @@ - + - Accidental Misuse - Accidental Misuse - + User Risks + Concepts associated with risks that arise due to User or Human use + accepted - + - Environmental Risk - Risks and issues that have their origin in environment or can affect the environment at large - + Material Damage + Something that acts as or causes Material Damage + + The criteria for what is considered material damage is based in jurisdictional laws and norms + 2022-03-30 + 2024-08-16 accepted + Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - - Data Corruption - Something that acts as or causes Corruption of Data - - This concept was called "Corruption Data" in DPV 2.0 - - 2022-08-17 - 2024-08-16 - modified - Harshvardhan J. Pandit + Individual Risk + Risks and issues that affect or have the potential to affect specific individuals + accepted - + - Terrorism - Something that acts as or causes Terrorism - - + Unauthorised System Modification + Something that acts as or causes Unauthorised System Modification + + + 2022-08-17 2024-08-16 accepted @@ -1791,77 +1767,74 @@ - + - Component Failure - Something that acts as or causes Component Failure - - Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of + Environmental Risk + Risks and issues that have their origin in environment or can affect the environment at large + accepted - - - - - Fee - Something that acts as or provides fees e.g. for using a service - - DGA 2.10 - 2024-04-14 - 2024-08-16 - modified - Georg P. Krog, Harshvardhan J. Pandit - - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - Internal Security Threat - Concepts associated with security threats and issues that originate within the organisation - + Human Errors + Something that acts as or causes Human Errors + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - Harm - Something that acts as or causes Harm to humans - - This concept refers to the general abstract notion of harm - 2022-08-13 - 2024-08-16 + Unauthorised Activity + Something that acts as or causes Unauthorised Activity + + + + accepted - Harshvardhan J. Pandit - + - Brute Force Authorisations - Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques - - + Physical Assault + Something that acts as or causes Physical Assault + + 2022-08-17 2024-08-16 accepted @@ -1869,127 +1842,194 @@ - - - - - Compensation - Something that acts as or provides compensation - which can be monetary and financial or in other forms - - 2024-04-14 - 2024-08-16 - accepted - Georg P. Krog, Harshvardhan J. Pandit - - + + + + + + + Risk Concepts - Turtle serialiation - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + + Primer for Data Privacy Vocabulary + + + + + + + + Equipment Failure + Something that acts as or causes Equipment Failure + + + Here equipment refers to physical equipment + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + + + + + Unauthorised System Access + Something that acts as or causes Unauthorised System Access + + + + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + + + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Threat Landscape 2021 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 - + - Security Attack - Something that acts as or causes an attack on security with the aim of undermining it - + Reward + Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + + 2024-04-14 + 2024-08-16 accepted + Georg P. Krog, Harshvardhan J. Pandit - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + + + Examples for Data Privacy Vocabulary + + + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + + + + + + + Risk Concepts - JSON-LD serialiation + + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - Individual Risk - Risks and issues that affect or have the potential to affect specific individuals + + Legal Risk + Risks and issues that have their basis in legal requirements and enforcement + accepted - + - Misuse - Something that acts as or causes Misuse - - 2024-06-11 - 2024-08-16 + Physical Harm + accepted - Delaram Golpayegani - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - ENISA Threat Landscape for Ransomware Attacks 2022 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + + + + + Compensation + Something that acts as or provides compensation - which can be monetary and financial or in other forms + + 2024-04-14 + 2024-08-16 + accepted + Georg P. Krog, Harshvardhan J. Pandit + + - + - Violation of Rights - Something that acts as or causes Violation of Rights + Prevent Exercising of Rights + Something that acts as or causes Prevent Exercising of Rights - This concept was called "ViolationOfRights" in DPV 2.0 + This concept was called "PreventExercisingOfRights" in DPV 2.0 2022-08-18 2024-08-16 accepted @@ -1997,128 +2037,128 @@ - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Threat Landscape for Ransomware Attacks 2022 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + + + ENISA Threat Landscape for Ransomware Attacks 2022 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + + - Operational Security Risk - Risks and issues that arise during operational processes - + Individual Health & Safety + accepted - + - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ENISA Reference Incident Classification Taxonomy 2018 https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + + Guides for Data Privacy Vocabulary + + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - ENISa Trust Services Security Incidents 2021 - https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + + + + Risk Concepts - HTML serialiation - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - - - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - + - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ENISA Methodology for Sectoral Cybersecurity Assessments https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment diff --git a/2.1-dev/risk/modules/risk_consequences.ttl b/2.1-dev/risk/modules/risk_consequences.ttl index b23e5df5b..87558834f 100644 --- a/2.1-dev/risk/modules/risk_consequences.ttl +++ b/2.1-dev/risk/modules/risk_consequences.ttl @@ -36,7 +36,9 @@ risk:AuthorisationFailure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Authorisation Failure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Authorisation Failure"@en . @@ -46,7 +48,8 @@ risk:AvailabilityBreach a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:DataBreach ; + skos:broader risk:AvailabilityConcept, + risk:DataBreach ; skos:inScheme risk:risk-consequences-classes . risk:Benefit a rdfs:Class, @@ -73,7 +76,8 @@ risk:Blackmail a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Blackmail"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Blackmail"@en . @@ -89,7 +93,9 @@ risk:BruteForceAuthorisations a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Brute Force Authorisations"@en . @@ -105,7 +111,8 @@ risk:Coercion a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Coercion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Coercion"@en . @@ -128,7 +135,8 @@ risk:ComponentFailure a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Component Failure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Component Failure"@en ; @@ -139,7 +147,8 @@ risk:ComponentMalfunction a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Component Malfunction"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Component Malfunction"@en ; @@ -156,7 +165,10 @@ risk:CompromiseAccount a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Compromise Account"@en . @@ -172,7 +184,8 @@ risk:CompromiseAccountCredentials a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:ConfidentialityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Compromise Account Credentials"@en . @@ -188,7 +201,8 @@ risk:ConfidentialityBreach a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:DataBreach ; + skos:broader risk:ConfidentialityConcept, + risk:DataBreach ; skos:definition "Something that acts as or causes Confidentiality Breach"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Confidentiality Breach"@en . @@ -220,7 +234,8 @@ risk:Cryptojacking a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Cryptojacking"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Cryptojacking"@en . @@ -251,7 +266,10 @@ risk:DataBreach a rdfs:Class, dex:E0071 ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SecurityBreach ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:SecurityBreach ; skos:definition "Something that acts as or causes Data Breach"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Data Breach"@en . @@ -267,7 +285,8 @@ risk:DataCorruption a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:IntegrityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Corruption of Data"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Data Corruption"@en ; @@ -280,14 +299,12 @@ risk:DenialServiceAttack a rdfs:Class, dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ], - [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Denial of Service Attack (DoS)"@en . @@ -329,7 +346,8 @@ risk:DistributedDenialServiceAttack a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en . @@ -355,7 +373,8 @@ risk:EquipmentFailure a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Equipment Failure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Equipment Failure"@en ; @@ -372,7 +391,8 @@ risk:EquipmentMalfunction a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Equipment Malfunction"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Equipment Malfunction"@en ; @@ -432,7 +452,8 @@ risk:Extorsion a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Extorsion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Extorsion"@en . @@ -488,7 +509,8 @@ risk:Fraud a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Fraud"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Fraud"@en . @@ -534,7 +556,8 @@ risk:IdentityFraud a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:ConfidentialityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Identity Fraud"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Identity Fraud"@en . @@ -550,7 +573,8 @@ risk:IdentityTheft a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:ConfidentialityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Identity Theft"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Identity Theft"@en . @@ -610,7 +634,8 @@ risk:IntegrityBreach a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:DataBreach ; + skos:broader risk:DataBreach, + risk:IntegrityConcept ; skos:inScheme risk:risk-consequences-classes . risk:IntentionalMisuse a rdfs:Class, @@ -634,22 +659,13 @@ risk:InterceptCommunications a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Interception of Communications"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Intercept Communications"@en ; skos:scopeNote "This concept was called \"InterceptionCommunications\" in DPV 2.0"@en . -risk:InternalSecurityThreat a rdfs:Class, - skos:Concept, - dpv:RiskConcept ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader dpv:RiskConcept ; - skos:definition "Concepts associated with security threats and issues that originate within the organisation"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Internal Security Threat"@en . - risk:JudicialCosts a rdfs:Class, skos:Concept, dpv:RiskConcept ; @@ -803,7 +819,10 @@ risk:MaliciousCodeAttack a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Malicious Code Attack"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Malicious Code Attack"@en . @@ -819,7 +838,10 @@ risk:MalwareAttack a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Malware Attack"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Malware Attack"@en . @@ -915,7 +937,8 @@ risk:PhishingScam a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Phishing Scam"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Phishing Scam"@en . @@ -994,7 +1017,8 @@ risk:Reidentification a rdfs:Class, dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:ConfidentialityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Re-identification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Re-identification"@en ; @@ -1107,7 +1131,9 @@ risk:Sabotage a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Sabotage"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Sabotage"@en . @@ -1123,7 +1149,8 @@ risk:Scam a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Scam"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Scam"@en . @@ -1133,7 +1160,10 @@ risk:SecurityAttack a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Security Attack"@en . @@ -1149,7 +1179,10 @@ risk:SecurityBreach a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Security Breach"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Security Breach"@en . @@ -1216,7 +1249,9 @@ risk:Spoofing a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat, + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept, risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Spoofing"@en ; skos:inScheme risk:risk-consequences-classes ; @@ -1233,7 +1268,8 @@ risk:SystemFailure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes System Failure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "System Failure"@en ; @@ -1250,7 +1286,10 @@ risk:SystemIntrusion a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes System Intrusion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "System Intrusion"@en . @@ -1266,7 +1305,8 @@ risk:SystemMalfunction a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes System Malfunction"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "System Malfunction"@en ; @@ -1299,7 +1339,10 @@ risk:UnauthorisedAccesstoPremises a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Access to Premises"@en . @@ -1309,7 +1352,10 @@ risk:UnauthorisedActivity a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised Activity"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Activity"@en . @@ -1325,7 +1371,9 @@ risk:UnauthorisedCodeAccess a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised Code Access"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Code Access"@en . @@ -1341,7 +1389,8 @@ risk:UnauthorisedCodeDisclosure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Code Disclosure"@en . @@ -1357,7 +1406,8 @@ risk:UnauthorisedCodeModification a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Code Modification"@en . @@ -1373,7 +1423,8 @@ risk:UnauthorisedDataAccess a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Data Access"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Data Access"@en . @@ -1389,7 +1440,8 @@ risk:UnauthorisedDataDisclosure a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Data Disclosure"@en . @@ -1405,7 +1457,8 @@ risk:UnauthorisedDataModification a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Data Modification"@en . @@ -1421,7 +1474,8 @@ risk:UnauthorisedInformationDisclosure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Information Disclosure"@en . @@ -1434,7 +1488,8 @@ risk:UnauthorisedReidentification a rdfs:Class, dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Re-Identification"@en . @@ -1450,7 +1505,8 @@ risk:UnauthorisedResourceUse a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Resource Use"@en . @@ -1466,7 +1522,9 @@ risk:UnauthorisedSystemAccess a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised System Access"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised System Access"@en . @@ -1482,7 +1540,8 @@ risk:UnauthorisedSystemModification a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised System Modification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised System Modification"@en . @@ -1498,7 +1557,9 @@ risk:UnwantedCodeDeletion a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unwanted Code Deletion"@en . @@ -1514,7 +1575,9 @@ risk:UnwantedDataDeletion a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unwanted Data Deletion"@en . @@ -1530,7 +1593,8 @@ risk:UnwantedDisclosureData a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unwanted Disclosure of Data"@en . @@ -1657,22 +1721,6 @@ risk:ViolenceAgainstChildren a rdfs:Class, skos:prefLabel "Violence against children"@en ; skos:scopeNote "This concept was called \"ChildViolence\" in DPV 2.0"@en . -risk:VulnerabilityCreated a rdfs:Class, - skos:Concept, - dpv:RiskConcept ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:modified "2024-08-16"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:InternalSecurityThreat ; - skos:definition "Something that acts as or causes Vulnerability Created"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Vulnerability Created"@en . - a owl:Ontology, profile:Profile ; dct:bibliographicCitation "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" ; diff --git a/2.1-dev/risk/risk-en.html b/2.1-dev/risk/risk-en.html index c8b42bf5f..4efbea699 100644 --- a/2.1-dev/risk/risk-en.html +++ b/2.1-dev/risk/risk-en.html @@ -1271,92 +1271,77 @@

Consequences and Impacts

dpv:hasImpact risk:RightsImpact . -

The risk concepts taxonomy is broadly divided into the following categories:

+

The concepts taxonomy is broadly divided into the following categories:

-
-

InternalSecurityThreat

-
    +
    +

    CIA Model

    +

    Confidentiality

    +
    • - risk:VulnerabilityCreated: Something that acts as or causes Vulnerability Created - go to full definition + risk:AuthorisationFailure: Something that acts as or causes Authorisation Failure + go to full definition
    • -
    -
    -
    -

    UserRisks

    -
    -
    -
    -

    ExternalSecurityThreat

    -
    • - risk:Blackmail: Something that acts as or causes Blackmail - go to full definition + risk:ConfidentialityBreach: Something that acts as or causes Confidentiality Breach + go to full definition
    • - risk:BruteForceAuthorisations: Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques - go to full definition - -
    • + risk:DataBreach: Something that acts as or causes Data Breach + go to full definition +
    • risk:Extorsion: Something that acts as or causes Extorsion @@ -1367,6 +1352,16 @@

      ExternalSecurityThreat

      risk:Fraud: Something that acts as or causes Fraud go to full definition +
    • +
    • + risk:IdentityFraud: Something that acts as or causes Identity Fraud + go to full definition + +
    • +
    • + risk:IdentityTheft: Something that acts as or causes Identity Theft + go to full definition +
    • risk:InterceptCommunications: Something that acts as or causes Interception of Communications @@ -1389,8 +1384,8 @@

      ExternalSecurityThreat

    • - risk:Sabotage: Something that acts as or causes Sabotage - go to full definition + risk:Reidentification: Something that acts as or causes Re-identification + go to full definition
    • @@ -1402,6 +1397,33 @@

      ExternalSecurityThreat

      risk:SecurityAttack: Something that acts as or causes an attack on security with the aim of undermining it go to full definition +
    • +
    • + risk:SecurityBreach: Something that acts as or causes Security Breach + go to full definition +
    • risk:Spoofing: Something that acts as or causes Spoofing @@ -1432,11 +1454,6 @@

      ExternalSecurityThreat

      risk:UnauthorisedCodeDisclosure: Something that acts as or causes Unauthorised Code Disclosure go to full definition -
    • -
    • - risk:UnauthorisedCodeModification: Something that acts as or causes Unauthorised Code Modification - go to full definition -
    • risk:UnauthorisedDataAccess: Something that acts as or causes Unauthorised Data Access @@ -1447,11 +1464,6 @@

      ExternalSecurityThreat

      risk:UnauthorisedDataDisclosure: Something that acts as or causes Unauthorised Data Disclosure go to full definition -
    • -
    • - risk:UnauthorisedDataModification: Something that acts as or causes Unauthorised Data Modification - go to full definition -
    • risk:UnauthorisedInformationDisclosure: Something that acts as or causes Unauthorised Information Disclosure @@ -1464,8 +1476,145 @@

      ExternalSecurityThreat

    • - risk:UnauthorisedResourceUse: Something that acts as or causes Unauthorised Resource Use - go to full definition + risk:UnauthorisedSystemAccess: Something that acts as or causes Unauthorised System Access + go to full definition + +
    • +
    • + risk:UnwantedDisclosureData: Something that acts as or causes Unwanted Disclosure of Data + go to full definition + +
    • +
    + +

    Integrity

    +
    -
    -
    -

    OperationalSecurityRisk

    -
      + +

      Availability

      +
      • - risk:AuthorisationFailure: Something that acts as or causes Authorisation Failure - go to full definition + risk:AvailabilityBreach: None + go to full definition
      • @@ -1519,13 +1662,39 @@

        OperationalSecurityRisk

      • - risk:CompromiseAccountCredentials: Something that acts as or causes Account Credentials to be compromised - go to full definition + risk:Cryptojacking: Something that acts as or causes Cryptojacking + go to full definition
      • - risk:DataCorruption: Something that acts as or causes Corruption of Data - go to full definition + risk:DataBreach: Something that acts as or causes Data Breach + go to full definition + +
      • +
      • + risk:DenialServiceAttack: Something that acts as or causes Denial of Service Attack (DoS) + go to full definition + +
      • +
      • + risk:DistributedDenialServiceAttack: Something that acts as or causes Distributed Denial of Service Attack (DDoS) + go to full definition
      • @@ -1539,18 +1708,23 @@

        OperationalSecurityRisk

      • - risk:IdentityFraud: Something that acts as or causes Identity Fraud - go to full definition + risk:MaliciousCodeAttack: Something that acts as or causes Malicious Code Attack + go to full definition
      • - risk:IdentityTheft: Something that acts as or causes Identity Theft - go to full definition + risk:MalwareAttack: Something that acts as or causes Malware Attack + go to full definition
      • - risk:Reidentification: Something that acts as or causes Re-identification - go to full definition + risk:Sabotage: Something that acts as or causes Sabotage + go to full definition + +
      • +
      • + risk:SecurityAttack: Something that acts as or causes an attack on security with the aim of undermining it + go to full definition
      • @@ -1581,13 +1755,13 @@

        OperationalSecurityRisk

    • - risk:Spoofing: Something that acts as or causes Spoofing - go to full definition + risk:SystemFailure: Something that acts as or causes System Failure + go to full definition
    • - risk:SystemFailure: Something that acts as or causes System Failure - go to full definition + risk:SystemIntrusion: Something that acts as or causes System Intrusion + go to full definition
    • @@ -1595,11 +1769,68 @@

      OperationalSecurityRisk

      go to full definition
    • +
    • + risk:UnauthorisedAccesstoPremises: Something that acts as or causes Unauthorised Access to Premises + go to full definition + +
    • +
    • + risk:UnauthorisedActivity: Something that acts as or causes Unauthorised Activity + go to full definition + +
    • +
    • + risk:UnauthorisedResourceUse: Something that acts as or causes Unauthorised Resource Use + go to full definition + +
    • +
    • + risk:UnwantedCodeDeletion: Something that acts as or causes Unwanted Code Deletion + go to full definition + +
    • +
    • + risk:UnwantedDataDeletion: Something that acts as or causes Unwanted Data Deletion + go to full definition + +
    -
    -
    -

    LegalRisk

    -
      +
    + +
    +

    User

    +
    +
    + +
    +

    Legal

    +
    • risk:CopyrightViolation: Something that acts as or causes Copyright Violation go to full definition @@ -1666,10 +1897,11 @@

      LegalRisk

    -
    -
    -

    ReputationalRisk

    -
      +
    + +
    +

    Reputational

    +
    • risk:LoseCredibility: Something that acts as or causes Loss of Credibility go to full definition @@ -1706,10 +1938,11 @@

      ReputationalRisk

    -
    -
    -

    SocietalRisk

    -
      +
    + +
    +

    Societal

    +
    • risk:Discrimination: Something that acts as or causes Discrimination go to full definition @@ -1761,10 +1994,11 @@

      SocietalRisk

    -
    -
    -

    IndividualRisk

    -
      +
    + +
    +

    Individual

    +
    • risk:Harm: Something that acts as or causes Harm to humans go to full definition @@ -1811,14 +2045,16 @@

      IndividualRisk

    -
    -
    -

    EnvironmentalRisk

    -
    -
    -
    -

    FinancialImpact

    -
      +
    + +
    +

    Environmental

    +
    +
    + +
    +

    Financial

    +
    • risk:Benefit: Something that acts as or causes benefits go to full definition @@ -1865,7 +2101,7 @@

      FinancialImpact

    -
    +
@@ -2128,8 +2364,6 @@

Classes

- - @@ -3007,6 +3241,12 @@

Authorisation Failure

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types + risk:IntegrityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -3088,6 +3328,33 @@

None

Broader/Parent types + risk:DataBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:IntegrityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:IntegrityConcept + + Broader/Parent types risk:DataBreachrisk:SecurityBreachrisk:OperationalSecurityRisk @@ -3392,6 +3659,9 @@

Blackmail

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -3473,8 +3743,14 @@

Brute Force Authorisations

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -3724,6 +4000,9 @@

Coercion

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -3883,6 +4162,9 @@

Component Failure

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -3955,6 +4237,9 @@

Component Malfunction

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -4027,6 +4312,15 @@

Compromise Account

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types + risk:IntegrityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -4108,6 +4402,9 @@

Compromise Account Credentials

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -4189,6 +4486,33 @@

Confidentiality Breach

Broader/Parent types + risk:DataBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:IntegrityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:IntegrityConcept + + Broader/Parent types risk:DataBreachrisk:SecurityBreachrisk:OperationalSecurityRisk @@ -4666,6 +4990,9 @@

Cryptojacking

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -4825,6 +5152,18 @@

Data Breach

Broader/Parent types + risk:SecurityBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:SecurityBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:SecurityBreach + → risk:IntegrityConcept + + Broader/Parent types risk:SecurityBreachrisk:OperationalSecurityRiskdpv:RiskConcept @@ -4910,6 +5249,9 @@

Data Corruption

Broader/Parent types + risk:IntegrityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -5069,6 +5411,9 @@

Denial of Service Attack (DoS)

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -5092,7 +5437,7 @@

Denial of Service Attack (DoS)

Source - ISO/IEC 27005:2018, ISO/IEC 27005:2018 + ISO/IEC 27005:2018 @@ -5385,6 +5730,9 @@

Distributed Denial of Service Attack (DDoS)

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -5609,6 +5957,9 @@

Equipment Failure

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -5693,6 +6044,9 @@

Equipment Malfunction

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -6012,6 +6366,9 @@

Extorsion

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -6815,6 +7172,9 @@

Fraud

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -7499,6 +7859,9 @@

Identity Fraud

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -7580,6 +7943,9 @@

Identity Theft

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -7862,7 +8228,7 @@

Incident

Date Created - 2024-02-14 + 2024-05-19 Date Modified @@ -9873,6 +10239,33 @@

None

Broader/Parent types + risk:DataBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:IntegrityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:IntegrityConcept + + Broader/Parent types risk:DataBreachrisk:SecurityBreachrisk:OperationalSecurityRisk @@ -10085,6 +10478,9 @@

Intercept Communications

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -10141,74 +10537,6 @@

Intercept Communications

-
-

Internal Security Threat

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
TermInternalSecurityThreatPrefixrisk
LabelInternal Security Threat
IRIhttps://w3id.org/dpv/risk#InternalSecurityThreat
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types dpv:RiskConcept -
DefinitionConcepts associated with security threats and issues that originate within the organisation
See More: section RISK-CONSEQUENCES in RISK -
-
- - - @@ -11284,8 +11612,17 @@

Malicious Code Attack

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -11365,8 +11702,17 @@

Malware Attack

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -12766,6 +13112,9 @@

Phishing Scam

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -13544,6 +13893,9 @@

Re-identification

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -21592,8 +21944,14 @@

Sabotage

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -21673,6 +22031,9 @@

Scam

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -21754,8 +22115,17 @@

Security Attack

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -21823,6 +22193,15 @@

Security Breach

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types + risk:IntegrityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -22365,10 +22744,16 @@

Spoofing

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept Broader/Parent types + risk:IntegrityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -22450,6 +22835,9 @@

System Failure

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -22534,8 +22922,17 @@

System Intrusion

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -22615,6 +23012,9 @@

System Malfunction

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -22933,8 +23333,17 @@

Unauthorised Access to Premises

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23014,8 +23423,17 @@

Unauthorised Activity

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23083,8 +23501,14 @@

Unauthorised Code Access

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23164,6 +23588,9 @@

Unauthorised Code Disclosure

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23247,6 +23674,9 @@

Unauthorised Code Modification

Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23326,6 +23756,9 @@

Unauthorised Data Access

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23407,6 +23840,9 @@

Unauthorised Data Disclosure

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23490,6 +23926,9 @@

Unauthorised Data Modification

Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23569,6 +24008,9 @@

Unauthorised Information Disclosure

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23650,6 +24092,9 @@

Unauthorised Re-Identification

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23728,6 +24173,9 @@

Unauthorised Resource Use

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23809,8 +24257,14 @@

Unauthorised System Access

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23892,6 +24346,9 @@

Unauthorised System Modification

Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23971,8 +24428,14 @@

Unwanted Code Deletion

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -24052,8 +24515,14 @@

Unwanted Data Deletion

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -24133,6 +24602,9 @@

Unwanted Disclosure of Data

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -25417,87 +25889,6 @@

Vulnerability

- - - -
-

Vulnerability Created

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
TermVulnerabilityCreatedPrefixrisk
LabelVulnerability Created
IRIhttps://w3id.org/dpv/risk#VulnerabilityCreated
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:InternalSecurityThreat - → dpv:RiskConcept -
DefinitionSomething that acts as or causes Vulnerability Created
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK -
-
@@ -25630,8 +26021,6 @@

Properties

- - @@ -26435,9 +26824,6 @@

has vulnerability

- - - @@ -27237,9 +27623,6 @@

refers to risk

- - - @@ -27334,8 +27717,6 @@

External

- - @@ -27637,9 +28018,6 @@

External

- - - @@ -28223,9 +28601,6 @@

External

- - -
diff --git a/2.1-dev/risk/risk-owl.html b/2.1-dev/risk/risk-owl.html index 117288ffd..25592e7bc 100644 --- a/2.1-dev/risk/risk-owl.html +++ b/2.1-dev/risk/risk-owl.html @@ -437,8 +437,6 @@

Classes

- - @@ -1342,6 +1340,12 @@

Authorisation Failure

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of + risk-owl:IntegrityConcept + + Sub-class of risk-owl:OperationalSecurityRiskdpv-owl:RiskConcept @@ -1425,6 +1429,33 @@

None

Sub-class of + risk-owl:DataBreach + → risk-owl:AvailabilityConcept + + Sub-class of + risk-owl:DataBreach + → risk-owl:ConfidentialityConcept + + Sub-class of + risk-owl:DataBreach + → risk-owl:IntegrityConcept + + Sub-class of + risk-owl:DataBreach + → risk-owl:SecurityBreach + → risk-owl:AvailabilityConcept + + Sub-class of + risk-owl:DataBreach + → risk-owl:SecurityBreach + → risk-owl:ConfidentialityConcept + + Sub-class of + risk-owl:DataBreach + → risk-owl:SecurityBreach + → risk-owl:IntegrityConcept + + Sub-class of risk-owl:DataBreachrisk-owl:SecurityBreachrisk-owl:OperationalSecurityRisk @@ -1736,6 +1767,9 @@

Blackmail

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept @@ -1819,8 +1853,14 @@

Brute Force Authorisations

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept + + Sub-class of + risk-owl:IntegrityConcept @@ -2076,6 +2116,9 @@

Coercion

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept @@ -2239,6 +2282,9 @@

Component Failure

Sub-class of + risk-owl:AvailabilityConcept + + Sub-class of risk-owl:OperationalSecurityRiskdpv-owl:RiskConcept @@ -2313,6 +2359,9 @@

Component Malfunction

Sub-class of + risk-owl:AvailabilityConcept + + Sub-class of risk-owl:OperationalSecurityRiskdpv-owl:RiskConcept @@ -2387,6 +2436,15 @@

Compromise Account

Sub-class of + risk-owl:AvailabilityConcept + + Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of + risk-owl:IntegrityConcept + + Sub-class of risk-owl:OperationalSecurityRiskdpv-owl:RiskConcept @@ -2470,6 +2528,9 @@

Compromise Account Credentials

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:OperationalSecurityRiskdpv-owl:RiskConcept @@ -2553,6 +2614,33 @@

Confidentiality Breach

Sub-class of + risk-owl:DataBreach + → risk-owl:AvailabilityConcept + + Sub-class of + risk-owl:DataBreach + → risk-owl:ConfidentialityConcept + + Sub-class of + risk-owl:DataBreach + → risk-owl:IntegrityConcept + + Sub-class of + risk-owl:DataBreach + → risk-owl:SecurityBreach + → risk-owl:AvailabilityConcept + + Sub-class of + risk-owl:DataBreach + → risk-owl:SecurityBreach + → risk-owl:ConfidentialityConcept + + Sub-class of + risk-owl:DataBreach + → risk-owl:SecurityBreach + → risk-owl:IntegrityConcept + + Sub-class of risk-owl:DataBreachrisk-owl:SecurityBreachrisk-owl:OperationalSecurityRisk @@ -3040,6 +3128,9 @@

Cryptojacking

Sub-class of + risk-owl:AvailabilityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept @@ -3203,6 +3294,18 @@

Data Breach

Sub-class of + risk-owl:SecurityBreach + → risk-owl:AvailabilityConcept + + Sub-class of + risk-owl:SecurityBreach + → risk-owl:ConfidentialityConcept + + Sub-class of + risk-owl:SecurityBreach + → risk-owl:IntegrityConcept + + Sub-class of risk-owl:SecurityBreachrisk-owl:OperationalSecurityRiskdpv-owl:RiskConcept @@ -3292,6 +3395,9 @@

Data Corruption

Sub-class of + risk-owl:IntegrityConcept + + Sub-class of risk-owl:OperationalSecurityRiskdpv-owl:RiskConcept @@ -3454,6 +3560,9 @@

Denial of Service Attack (DoS)

Sub-class of + risk-owl:AvailabilityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept @@ -3477,7 +3586,7 @@

Denial of Service Attack (DoS)

Source - ISO/IEC 27005:2018,ISO/IEC 27005:2018 + ISO/IEC 27005:2018 @@ -3778,6 +3887,9 @@

Distributed Denial of Service Attack (DDoS)

Sub-class of + risk-owl:AvailabilityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept @@ -4007,6 +4119,9 @@

Equipment Failure

Sub-class of + risk-owl:AvailabilityConcept + + Sub-class of risk-owl:OperationalSecurityRiskdpv-owl:RiskConcept @@ -4093,6 +4208,9 @@

Equipment Malfunction

Sub-class of + risk-owl:AvailabilityConcept + + Sub-class of risk-owl:OperationalSecurityRiskdpv-owl:RiskConcept @@ -4420,6 +4538,9 @@

Extorsion

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept @@ -5243,6 +5364,9 @@

Fraud

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept @@ -5943,6 +6067,9 @@

Identity Fraud

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:OperationalSecurityRiskdpv-owl:RiskConcept @@ -6026,6 +6153,9 @@

Identity Theft

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:OperationalSecurityRiskdpv-owl:RiskConcept @@ -6315,7 +6445,7 @@

Incident

Date Created - 2024-02-14 + 2024-05-19 Date Modified @@ -8363,6 +8493,33 @@

None

Sub-class of + risk-owl:DataBreach + → risk-owl:AvailabilityConcept + + Sub-class of + risk-owl:DataBreach + → risk-owl:ConfidentialityConcept + + Sub-class of + risk-owl:DataBreach + → risk-owl:IntegrityConcept + + Sub-class of + risk-owl:DataBreach + → risk-owl:SecurityBreach + → risk-owl:AvailabilityConcept + + Sub-class of + risk-owl:DataBreach + → risk-owl:SecurityBreach + → risk-owl:ConfidentialityConcept + + Sub-class of + risk-owl:DataBreach + → risk-owl:SecurityBreach + → risk-owl:IntegrityConcept + + Sub-class of risk-owl:DataBreachrisk-owl:SecurityBreachrisk-owl:OperationalSecurityRisk @@ -8580,6 +8737,9 @@

Intercept Communications

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept @@ -8633,76 +8793,6 @@

Intercept Communications

-
-

Internal Security Threat

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
TermInternalSecurityThreatPrefixrisk-owl
LabelInternal Security Threat
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#InternalSecurityThreat
- https://w3id.org/dpv/risk#InternalSecurityThreat -
Type rdfs:Class - , owl:Class - , dpv-owl:RiskConcept -
Sub-class of dpv-owl:RiskConcept -
DefinitionConcepts associated with security threats and issues that originate within the organisation
Documented inRisk Risk-consequences
-
- - - @@ -9809,8 +9899,17 @@

Malicious Code Attack

Sub-class of + risk-owl:AvailabilityConcept + + Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept + + Sub-class of + risk-owl:IntegrityConcept @@ -9892,8 +9991,17 @@

Malware Attack

Sub-class of + risk-owl:AvailabilityConcept + + Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept + + Sub-class of + risk-owl:IntegrityConcept @@ -11327,6 +11435,9 @@

Phishing Scam

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept @@ -12125,6 +12236,9 @@

Re-identification

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:OperationalSecurityRiskdpv-owl:RiskConcept @@ -20377,8 +20491,14 @@

Sabotage

Sub-class of + risk-owl:AvailabilityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept + + Sub-class of + risk-owl:IntegrityConcept @@ -20460,6 +20580,9 @@

Scam

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept @@ -20543,8 +20666,17 @@

Security Attack

Sub-class of + risk-owl:AvailabilityConcept + + Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept + + Sub-class of + risk-owl:IntegrityConcept @@ -20614,6 +20746,15 @@

Security Breach

Sub-class of + risk-owl:AvailabilityConcept + + Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of + risk-owl:IntegrityConcept + + Sub-class of risk-owl:OperationalSecurityRiskdpv-owl:RiskConcept @@ -21170,10 +21311,16 @@

Spoofing

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept Sub-class of + risk-owl:IntegrityConcept + + Sub-class of risk-owl:OperationalSecurityRiskdpv-owl:RiskConcept @@ -21257,6 +21404,9 @@

System Failure

Sub-class of + risk-owl:AvailabilityConcept + + Sub-class of risk-owl:OperationalSecurityRiskdpv-owl:RiskConcept @@ -21343,8 +21493,17 @@

System Intrusion

Sub-class of + risk-owl:AvailabilityConcept + + Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept + + Sub-class of + risk-owl:IntegrityConcept @@ -21426,6 +21585,9 @@

System Malfunction

Sub-class of + risk-owl:AvailabilityConcept + + Sub-class of risk-owl:OperationalSecurityRiskdpv-owl:RiskConcept @@ -21750,8 +21912,17 @@

Unauthorised Access to Premises

Sub-class of + risk-owl:AvailabilityConcept + + Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept + + Sub-class of + risk-owl:IntegrityConcept @@ -21833,8 +22004,17 @@

Unauthorised Activity

Sub-class of + risk-owl:AvailabilityConcept + + Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept + + Sub-class of + risk-owl:IntegrityConcept @@ -21904,8 +22084,14 @@

Unauthorised Code Access

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept + + Sub-class of + risk-owl:IntegrityConcept @@ -21987,6 +22173,9 @@

Unauthorised Code Disclosure

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept @@ -22072,6 +22261,9 @@

Unauthorised Code Modification

Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept + + Sub-class of + risk-owl:IntegrityConcept @@ -22153,6 +22345,9 @@

Unauthorised Data Access

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept @@ -22236,6 +22431,9 @@

Unauthorised Data Disclosure

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept @@ -22321,6 +22519,9 @@

Unauthorised Data Modification

Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept + + Sub-class of + risk-owl:IntegrityConcept @@ -22402,6 +22603,9 @@

Unauthorised Information Disclosure

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept @@ -22485,6 +22689,9 @@

Unauthorised Re-Identification

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept @@ -22565,6 +22772,9 @@

Unauthorised Resource Use

Sub-class of + risk-owl:AvailabilityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept @@ -22648,8 +22858,14 @@

Unauthorised System Access

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept + + Sub-class of + risk-owl:IntegrityConcept @@ -22733,6 +22949,9 @@

Unauthorised System Modification

Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept + + Sub-class of + risk-owl:IntegrityConcept @@ -22814,8 +23033,14 @@

Unwanted Code Deletion

Sub-class of + risk-owl:AvailabilityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept + + Sub-class of + risk-owl:IntegrityConcept @@ -22897,8 +23122,14 @@

Unwanted Data Deletion

Sub-class of + risk-owl:AvailabilityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept + + Sub-class of + risk-owl:IntegrityConcept @@ -22980,6 +23211,9 @@

Unwanted Disclosure of Data

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept @@ -24290,89 +24524,6 @@

Vulnerability

- - - -
-

Vulnerability Created

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
TermVulnerabilityCreatedPrefixrisk-owl
LabelVulnerability Created
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#VulnerabilityCreated
- https://w3id.org/dpv/risk#VulnerabilityCreated -
Type rdfs:Class - , owl:Class - , dpv-owl:RiskConcept -
Sub-class of risk-owl:InternalSecurityThreat - → dpv-owl:RiskConcept -
DefinitionSomething that acts as or causes Vulnerability Created
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
Documented inRisk Risk-consequences
-
@@ -24505,8 +24656,6 @@

Properties

- - @@ -25318,9 +25467,6 @@

has vulnerability

- - - @@ -26124,9 +26270,6 @@

refers to risk

- - - @@ -26214,8 +26357,6 @@

External

- - @@ -26517,9 +26658,6 @@

External

- - - @@ -27103,9 +27241,6 @@

External

- - -
diff --git a/2.1-dev/risk/risk-owl.jsonld b/2.1-dev/risk/risk-owl.jsonld index 27ac672c1..34a2bbb69 100644 --- a/2.1-dev/risk/risk-owl.jsonld +++ b/2.1-dev/risk/risk-owl.jsonld @@ -1,20 +1,14 @@ [ { - "@id": "https://w3id.org/dpv/risk/owl#MonitorRiskSource", + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -24,7 +18,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -36,37 +30,57 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Source" + "@value": "Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Risk Source" + "@value": "Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L4", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://www.w3.org/TR/json-ld11/" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/format": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://www.iana.org/assignments/media-types/application/ld+json" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/title": [ { - "@value": "0.41,xsd:decimal" + "@value": "Risk Concepts - JSON-LD serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.jsonld" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IncidentSuspectedReport", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -76,7 +90,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -88,21 +102,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + "@value": "A report describing the suspicion of an incident in the past or occuring" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:5 L:4)" + "@value": "Incident Suspected Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L2", + "@id": "https://w3id.org/dpv/risk/owl#LoseOpportunity", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -116,9 +130,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.08,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N2ea871931e3746e4aff469f67008e44f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -128,7 +148,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -140,21 +160,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" + "@value": "Something that acts as or causes Loss of Opportunity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:1 L:2)" + "@value": "Lose of Opportunity" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorRiskControl", + "@id": "_:N2ea871931e3746e4aff469f67008e44f", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ViolatingLegalObligation", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -165,7 +201,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N0b5dd4cc254540f49140434e86708abb" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -175,30 +222,52 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors another Control" + "@value": "Something that acts as or causes Violation of Legal Obligations" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Control" + "@value": "Violation of Legal Obligations" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S2L1", + "@id": "_:N0b5dd4cc254540f49140434e86708abb", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L1", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -217,7 +286,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.22,xsd:decimal" + "@value": "0.04,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -227,7 +296,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -239,43 +308,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM3x3 S:2 L:1)" + "@value": "Very Low Risk (RM5x5 S:1 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Sabotage", + "@id": "https://w3id.org/dpv/risk/owl#IncidentNotice", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nddcd9454cd3f48779b8299743d6f1150" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -285,7 +337,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/owl#Notice" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -297,37 +349,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Sabotage" + "@value": "Notice associated with an Incident" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sabotage" - } - ] - }, - { - "@id": "_:Nddcd9454cd3f48779b8299743d6f1150", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Incident Notice" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SystemFailure", + "@id": "https://w3id.org/dpv/risk/owl#MaterialDamage", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -338,7 +374,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-30" } ], "http://purl.org/dc/terms/modified": [ @@ -347,11 +383,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Ndb0e0e85d6ad4dabbf9efc7a0f2cb59a" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -359,7 +390,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -371,43 +402,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Failure" + "@value": "Something that acts as or causes Material Damage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Failure" + "@value": "Material Damage" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Here system refers to both hardware and software systems" - } - ] - }, - { - "@id": "_:Ndb0e0e85d6ad4dabbf9efc7a0f2cb59a", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ReduceLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L4", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -418,7 +433,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -428,7 +448,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReductionControl" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -440,57 +460,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that reduces the likelihood of an event" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reduce Likelihood" + "@value": "Moderate Risk (RM7x7 S:3 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/examples", + "@id": "https://w3id.org/dpv/risk/owl#VeryLowLikelihood", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#Likelihood", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://www.w3.org/TR/html/" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Examples for Data Privacy Vocabulary" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/examples" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IncidentAssessmentReport", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "0.1,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -500,7 +500,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -512,39 +515,29 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the assessment of an incident in terms of its effects or impacts" + "@value": "Level where Likelihood is Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Assessment Report" + "@value": "Very Low Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L7", + "@id": "https://w3id.org/dpv/risk/owl#ComponentMalfunction", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.71,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -552,7 +545,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -564,21 +560,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High" + "@value": "Something that acts as or causes Component Malfunction" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:5 L:7)" + "@value": "Component Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#BruteForceAuthorisations", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L3", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -592,15 +594,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Ned6a23a4f6894305bc5d07abc6872b8e" + "@value": "0.48,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -610,7 +606,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -622,48 +618,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Brute Force Authorisations" - } - ] - }, - { - "@id": "_:Ned6a23a4f6894305bc5d07abc6872b8e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "High Risk (RM5x5 S:4 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels", + "@id": "https://w3id.org/dpv/risk/owl#IncidentConcludingReport", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -673,7 +647,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskLevel" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -685,43 +659,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 7 Risk Levels from Extremely High to Extremely Low" + "@value": "A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "7 Risk Levels" + "@value": "Incident Concluding Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedInformationDisclosure", + "@id": "https://w3id.org/dpv/risk/owl#DeliberateIncident", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nb2d6659136cf4d2fa881ae5798bf0e58" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -731,7 +688,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -743,37 +700,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Information Disclosure" + "@value": "Incident caused due to deliberate actions of a human" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Information Disclosure" - } - ] - }, - { - "@id": "_:Nb2d6659136cf4d2fa881ae5798bf0e58", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Deliberate Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ErroneousSystemUse", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S2L1", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -787,15 +728,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Ne874eff2b0f74da79392c36cf77d71f1" + "@value": "0.22,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -805,7 +740,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -817,37 +752,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Erroneous System Use" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Erroneous System Use" - } - ] - }, - { - "@id": "_:Ne874eff2b0f74da79392c36cf77d71f1", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Low Risk (RM3x3 S:2 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S2L2", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L4", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -863,7 +782,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.44,xsd:decimal" + "@value": "0.64,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -873,7 +792,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -885,21 +804,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM3x3 S:2 L:2)" + "@value": "Very High Risk (RM5x5 S:4 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels", + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -910,7 +829,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -920,7 +839,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Likelihood" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -932,21 +851,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 5 Likelihood Levels from Very High to Very Low" + "@value": "Risk Mitigation Measure that uses controls to monitor events" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "5 Likelihood Levels" + "@value": "Monitor Control" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised." } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels", + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityBreach", "@type": [ - "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -957,7 +882,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N0571680fc6554da2a384a2e851d510c0" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -967,7 +903,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Severity" + "@id": "https://w3id.org/dpv/risk/owl#DataBreach" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -979,43 +918,47 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 3 Severity Levels from High to Low" + "@value": "Something that acts as or causes Confidentiality Breach" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "3 Severity Levels" + "@value": "Confidentiality Breach" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityBreach", + "@id": "_:N0571680fc6554da2a384a2e851d510c0", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#causedByVulnerability", + "@type": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/created": [ { - "@id": "_:N804ad242900c474395dd117c74dace8e" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1023,11 +966,6 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#DataBreach" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -1037,34 +975,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Confidentiality Breach" + "@value": "Indicates the associated context (subject) is caused by the indicated vulnerability (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confidentiality Breach" - } - ] - }, - { - "@id": "_:N804ad242900c474395dd117c74dace8e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "caused by vulnerability" } ], - "https://schema.org/url": [ + "https://schema.org/rangeIncludes": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemAccess", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingStatutoryObligations", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -1089,7 +1016,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N4387faf4bb854435bfdc47ebf666782a" + "@id": "_:Ne3511d0b904a403e93b1538888ad1023" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1099,30 +1026,36 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised System Access" + "@value": "Something that acts as or causes Violation of Statutory Obligations" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised System Access" + "@value": "Violation of Statutory Obligations" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0" } ] }, { - "@id": "_:N4387faf4bb854435bfdc47ebf666782a", + "@id": "_:Ne3511d0b904a403e93b1538888ad1023", "@type": [ "https://schema.org/WebPage" ], @@ -1138,16 +1071,38 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L3", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.12,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -1157,32 +1112,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that affect or have the potential to affect specific individuals" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Individual Risk" + "@value": "Very Low Risk (RM7x7 S:2 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AvoidSource", + "@id": "https://w3id.org/dpv/risk/owl#RightsViolation", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1192,7 +1153,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SourceControl" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1204,21 +1165,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that avoids the risk source" + "@value": "Something that acts as or causes Violation of Rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Avoid Source" + "@value": "Violation of Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DataBreach", + "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels", "@type": [ + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1229,26 +1196,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N82834c9f1ecf4644ab2d9343a1169c62" - } - ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples/owl#E0069" - }, - { - "@id": "https://w3id.org/dpv/examples/owl#E0071" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1258,7 +1206,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach" + "@id": "https://w3id.org/dpv/owl#Likelihood" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1270,57 +1218,53 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Data Breach" + "@value": "Scale with 3 Likelihood Levels from High to Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Breach" + "@value": "3 Likelihood Levels" } ] }, { - "@id": "_:N82834c9f1ecf4644ab2d9343a1169c62", + "@id": "https://w3id.org/dpv/risk/owl#LoseTrust", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#hasRiskSource", - "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskSource" + "@id": "_:N95b0eaaa71714fb48e2d00a428e03220" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1332,31 +1276,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the risk (subject) has the indicated risk source (object)" + "@value": "Something that acts as or causes Loss of Trust" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has risk source" + "@value": "Lose of Trust" } + ] + }, + { + "@id": "_:N95b0eaaa71714fb48e2d00a428e03220", + "@type": [ + "https://schema.org/WebPage" ], - "https://schema.org/domainIncludes": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@value": "ISO/IEC 27005:2018" } ], - "https://schema.org/rangeIncludes": [ + "https://schema.org/url": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskSource" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L5", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L1", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1372,7 +1322,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.41,xsd:decimal" + "@value": "0.04,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1394,21 +1344,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:4 L:5)" + "@value": "Extremely Low Risk (RM7x7 S:2 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L3", + "@id": "https://w3id.org/dpv/risk/owl#IncidentMitigated", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1419,12 +1369,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.12,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1434,7 +1379,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1446,23 +1391,28 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low" + "@value": "The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:1 L:3)" + "@value": "Incident Mitigated" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#JudicialCosts", + "@id": "https://w3id.org/dpv/risk/owl#ThreatSource", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -1470,7 +1420,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1482,21 +1432,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that involves or causes judicial costs to be paid" + "@value": "Source of threat event, including both agent and non-agent sources" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Judicial Costs" + "@value": "Threat Source" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach", + "@id": "https://w3id.org/dpv/risk/owl#MonitorVulnerabilities", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1507,18 +1457,54 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Control that monitors a Risk Vulnerability" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Monitor Vulnerabilities" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ { - "@id": "_:Nee086e9da9f643e2837c115c27f1cabc" + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1528,7 +1514,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1540,37 +1526,51 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Security Breach" + "@value": "A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Security Breach" + "@value": "Risk Matrix 5x5" } ] }, { - "@id": "_:Nee086e9da9f643e2837c115c27f1cabc", + "@id": "https://w3id.org/dpv/risk/owl#IndividualHealthSafety", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Individual Health & Safety" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L6", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S2L3", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1586,7 +1586,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.24,xsd:decimal" + "@value": "0.67,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1596,7 +1596,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1608,20 +1608,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:2 L:6)" + "@value": "High Risk (RM3x3 S:2 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExtremelyLowRisk", + "@id": "https://w3id.org/dpv/risk/owl#RemoveSource", "@type": [ - "https://w3id.org/dpv/owl#RiskLevel", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -1633,12 +1633,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.01,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1648,7 +1643,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#SourceControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1660,27 +1655,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Extremely Low" + "@value": "Control that removes the risk source" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" + "@value": "Remove Source" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemModification", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L3", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1694,15 +1683,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N0c47798cd08a44d790a99ee3c58dcfb9" + "@value": "0.36,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1712,7 +1695,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1724,37 +1707,63 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised System Modification" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised System Modification" + "@value": "Moderate Risk (RM5x5 S:3 L:3)" } ] }, { - "@id": "_:N0c47798cd08a44d790a99ee3c58dcfb9", + "@id": "https://w3id.org/dpv/risk/owl#ContainmentControl", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/created": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "https://schema.org/url": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Control to contain event" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Containment Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Fraud", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L1", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1768,15 +1777,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nd4dde0f0f01e4d739b22630aa8ad7d7a" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1786,7 +1789,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1798,37 +1801,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Fraud" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Fraud" - } - ] - }, - { - "@id": "_:Nd4dde0f0f01e4d739b22630aa8ad7d7a", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Low Risk (RM5x5 S:4 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AuthorisationFailure", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L5", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1842,15 +1829,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N8906a1d2a7bd4484854e88a2dc1b93a5" + "@value": "0.71,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1860,7 +1841,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1872,37 +1853,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Authorisation Failure" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Authorisation Failure" + "@value": "Extremely High Risk (RM7x7 S:7 L:5)" } ] }, { - "@id": "_:N8906a1d2a7bd4484854e88a2dc1b93a5", + "@id": "https://w3id.org/dpv/risk/owl#ChangeImpact", "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISa Trust Services Security Incidents 2021" - } + "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" + "@value": "Harshvardhan J. Pandit" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IncidentHandlingReport", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { @@ -1917,7 +1888,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@id": "https://w3id.org/dpv/risk/owl#ImpactControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1929,18 +1900,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence" + "@value": "Control that changes Impact" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Handling Report" + "@value": "Change Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PhysicalAssault", + "@id": "https://w3id.org/dpv/risk/owl#HumanErrors", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -1965,7 +1936,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N4414613afa8c4456b9a9b6c3f17a7a0c" + "@id": "_:Na882c52257364f5896e5b38b50bb08fe" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1975,7 +1946,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1987,36 +1958,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Physical Assault" + "@value": "Something that acts as or causes Human Errors" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Physical Assault" + "@value": "Human Errors" } ] }, { - "@id": "_:N4414613afa8c4456b9a9b6c3f17a7a0c", + "@id": "_:Na882c52257364f5896e5b38b50bb08fe", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PsychologicalHarm", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L2", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -2031,15 +2002,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N903ec696d7504183af4ba63f3f295e8e" + "@value": "0.29,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2049,7 +2014,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2061,37 +2026,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Psychological Harm" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Psychological Harm" - } - ] - }, - { - "@id": "_:N903ec696d7504183af4ba63f3f295e8e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Moderate Risk (RM7x7 S:7 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccount", + "@id": "https://w3id.org/dpv/risk/owl#SystemMalfunction", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2113,7 +2062,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N2ad682e6dc844471903bc2f55f3eaae7" + "@id": "_:N18aeaa08367a4c56822793249e34feae" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2122,6 +2071,9 @@ } ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, { "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } @@ -2135,53 +2087,71 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes a compromised account that is then used by the compromiser" + "@value": "Something that acts as or causes System Malfunction" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account" + "@value": "System Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here system refers to both hardware and software systems" } ] }, { - "@id": "_:N2ad682e6dc844471903bc2f55f3eaae7", + "@id": "_:N18aeaa08367a4c56822793249e34feae", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L1", + "@id": "https://w3id.org/dpv/risk/owl#Incident", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" + }, + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.04,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples/owl#E0070" + }, + { + "@id": "https://w3id.org/dpv/examples/owl#E0069" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2191,7 +2161,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/owl#RiskConcept" + }, + { + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2203,38 +2176,43 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "An actual or occured event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:1 L:1)" + "@value": "Incident" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Incident is realised or materialised risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Payment", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L2", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2244,7 +2222,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2256,21 +2234,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Payment" + "@value": "Very Low Risk (RM5x5 S:1 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#HighLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#Blackmail", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Likelihood", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2281,12 +2259,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.75,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N72e00e4999f548eb88bf909311860524" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2296,13 +2280,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" }, { - "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2314,57 +2295,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is High" + "@value": "Something that acts as or causes Blackmail" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" + "@value": "Blackmail" } ] }, { - "@id": "https://w3id.org/dpv/primer", + "@id": "_:N72e00e4999f548eb88bf909311860524", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Primer for Data Privacy Vocabulary" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/primer" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "https://schema.org/url": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Damage", + "@id": "https://w3id.org/dpv/risk/owl#LowLikelihood", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -2376,13 +2336,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.25,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2392,7 +2351,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2404,20 +2369,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Damage" + "@value": "Level where Likelihood is Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Damage" + "@value": "Low Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L7", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAssessment", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -2429,12 +2400,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N812ddb57c74f4cbeb4d59d4bc7907be8" + "@value": "0.86,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2444,7 +2415,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2456,36 +2427,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other." + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix" - } - ] - }, - { - "@id": "_:N812ddb57c74f4cbeb4d59d4bc7907be8", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "IEC 31010:2019" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/72140.html" + "@value": "Extremely High Risk (RM7x7 S:6 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IdentityTheft", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L6", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -2500,15 +2455,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nad476399871e41a5bd37e1133df27770" + "@value": "0.86,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2518,7 +2467,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2530,37 +2479,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Identity Theft" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identity Theft" + "@value": "Extremely High Risk (RM7x7 S:7 L:6)" } ] }, { - "@id": "_:Nad476399871e41a5bd37e1133df27770", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L2", + "@id": "https://w3id.org/dpv/risk/owl#LowRisk", "@type": [ + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2571,12 +2504,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.40,xsd:decimal" + "@value": "0.25,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2586,7 +2519,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2598,45 +2537,29 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" + "@value": "Level where Risk is Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:5 L:2)" + "@value": "Low Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingCodeOfConduct", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingPolicy", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N3d2e8d97024142dca7a47b73cbb8097c" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -2650,46 +2573,24 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Code of Conduct" + "@value": "Something that acts as or causes violation of policy which can be either internal or external policy" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Code of Conduct" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N3d2e8d97024142dca7a47b73cbb8097c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Violating Policy" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingLegalObligation", + "@id": "https://w3id.org/dpv/risk/owl#LoseCustomerConfidence", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -2714,7 +2615,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Naf3bb0ebde894641a8c0a69545e7f6cc" + "@id": "_:N669b51dd9b0f4a71983f16dfc274956a" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2724,36 +2625,30 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Legal Obligations" + "@value": "Something that acts as or causes Loss of Customer Confidence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Legal Obligations" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0" + "@value": "Lose of Customer Confidence" } ] }, { - "@id": "_:Naf3bb0ebde894641a8c0a69545e7f6cc", + "@id": "_:N669b51dd9b0f4a71983f16dfc274956a", "@type": [ "https://schema.org/WebPage" ], @@ -2769,10 +2664,37 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExtremelyLowLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityBreach", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Likelihood", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#DataBreach" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#LowSeverity", + "@type": [ + "https://w3id.org/dpv/owl#Severity", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2788,7 +2710,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.01,xsd:decimal" + "@value": "0.25,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2798,7 +2720,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2810,27 +2738,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Extremely Low" + "@value": "Level where Severity is Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Likelihood" + "@value": "Low Severity" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" + "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L1", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L1", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2846,7 +2774,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.16,xsd:decimal" + "@value": "0.06,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2856,7 +2784,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2868,32 +2796,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:4 L:1)" + "@value": "Extremely Low Risk (RM7x7 S:3 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L3", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@language": "en", - "@value": "ISO 31073:2022 Risk management vocabulary" + "@value": "0.06,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2903,7 +2836,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskManagement" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2915,18 +2848,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Assessment of risk involving its identification, analysis, and evaluation" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Assessment" + "@value": "Extremely Low Risk (RM7x7 S:1 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L4", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L1", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2945,7 +2878,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.80,xsd:decimal" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2967,21 +2900,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:5 L:4)" + "@value": "Very Low Risk (RM5x5 S:3 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SexualViolence", + "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccountCredentials", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3003,7 +2936,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nbeddee22b7a841e39879764ab63949f8" + "@id": "_:N1005943ded74408ea68c811475686000" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3013,7 +2946,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3025,18 +2961,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Sexual Violence" + "@value": "Something that acts as or causes Account Credentials to be compromised" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sexual Violence" + "@value": "Compromise Account Credentials" } ] }, { - "@id": "_:Nbeddee22b7a841e39879764ab63949f8", + "@id": "_:N1005943ded74408ea68c811475686000", "@type": [ "https://schema.org/WebPage" ], @@ -3052,10 +2988,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L1", + "@id": "https://w3id.org/dpv/risk/owl#Sabotage", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3069,9 +3005,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.02,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N2fc72d8ce45943bcaad06c0a96aac629" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3081,7 +3023,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3093,82 +3041,53 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Something that acts as or causes Sabotage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:1 L:1)" + "@value": "Sabotage" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AccidentalMisuse", + "@id": "_:N2fc72d8ce45943bcaad06c0a96aac629", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "https://schema.org/WebPage" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "https://schema.org/url": [ { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L2", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2002/07/owl#Class" ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/contributor": [ { - "@language": "en", - "@value": "accepted" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Accidental Misuse" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Accidental Misuse" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#Spoofing", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N698cebdfba864777b23d25052c4d2493" - }, + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N603a4b8fadf24d23ac9c224927644c9d" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3178,10 +3097,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3193,84 +3109,68 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Spoofing" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Spoofing" - } - ] - }, - { - "@id": "_:N698cebdfba864777b23d25052c4d2493", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Moderate Risk (RM7x7 S:6 L:2)" } ] }, { - "@id": "_:N603a4b8fadf24d23ac9c224927644c9d", + "@id": "https://w3id.org/dpv/risk/owl#RemoveImpact", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + "@id": "https://w3id.org/dpv/risk/owl#ImpactControl" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "Risk Concepts - RDF/XML serialiation" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.rdf" + "@language": "en", + "@value": "Control that removes Impact i.e. prevents it from materialising" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@language": "en", + "@value": "Remove Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseCredibility", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L2", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3284,15 +3184,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N347037135ba54cefae0a2a69a47e52d9" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3302,7 +3196,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3314,34 +3208,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Credibility" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Credibility" - } - ] - }, - { - "@id": "_:N347037135ba54cefae0a2a69a47e52d9", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Extremely Low Risk (RM7x7 S:2 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DenialServiceAttack", + "@id": "https://w3id.org/dpv/risk/owl#Compensation", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -3349,13 +3227,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], "http://purl.org/dc/terms/modified": [ @@ -3364,14 +3242,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nf82ac345e0fe44a394f7da0ec78ef801" - }, - { - "@id": "_:N51a29309d655420e8611a50e7d2baa7c" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -3379,7 +3249,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3391,53 +3261,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Denial of Service Attack (DoS)" + "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Denial of Service Attack (DoS)" - } - ] - }, - { - "@id": "_:Nf82ac345e0fe44a394f7da0ec78ef801", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "_:N51a29309d655420e8611a50e7d2baa7c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Compensation" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L5", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L6", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3453,7 +3291,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.71,xsd:decimal" + "@value": "0.73,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3475,20 +3313,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:7 L:5)" + "@value": "Extremely High Risk (RM7x7 S:6 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeDisclosure", + "@id": "https://w3id.org/dpv/risk/owl#IncidentHalted", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -3500,18 +3338,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N540e39aa17014568ba5a2b03534c1f19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3521,7 +3348,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3533,34 +3360,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Disclosure" + "@value": "The incident has halted or paused with a high likelihood of resuming or recurring" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Disclosure" - } - ] - }, - { - "@id": "_:N540e39aa17014568ba5a2b03534c1f19", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "Incident Halted" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeModification", + "@id": "https://w3id.org/dpv/risk/owl#RightsLimitation", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -3568,13 +3379,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://purl.org/dc/terms/modified": [ @@ -3583,11 +3394,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N8ae12eb2b96a4c7e97a8739ee00ffe80" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -3595,7 +3401,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3607,37 +3413,85 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Modification" + "@value": "Something that acts as or causes Limitation of Rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Modification" + "@value": "Limitation of Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0" } ] }, { - "@id": "_:N8ae12eb2b96a4c7e97a8739ee00ffe80", + "@id": "https://w3id.org/dpv/risk/owl#ExtremelyHighLikelihood", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/owl#Likelihood", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.99,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Level where Likelihood is Extremely High" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Extremely High Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PersonalSafetyEndangerment", + "@id": "https://w3id.org/dpv/risk/owl#IdentityFraud", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3659,7 +3513,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Na66b6d002d3f448981a58870da1a686e" + "@id": "_:Nc74530c53d534886a66e5a7f741398bb" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3669,7 +3523,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3681,37 +3538,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Personal Safety Endangerment" + "@value": "Something that acts as or causes Identity Fraud" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Personal Safety Endangerment" + "@value": "Identity Fraud" } ] }, { - "@id": "_:Na66b6d002d3f448981a58870da1a686e", + "@id": "_:Nc74530c53d534886a66e5a7f741398bb", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L7", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataAccess", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3725,9 +3582,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.43,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N0eacc049940646a99623da2cd6a2d394" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3737,7 +3600,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3749,20 +3615,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High" + "@value": "Something that acts as or causes Unauthorised Data Access" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:3 L:7)" + "@value": "Unauthorised Data Access" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ChangeConsequence", + "@id": "_:N0eacc049940646a99623da2cd6a2d394", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#HighLikelihood", + "@type": [ + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -3774,7 +3656,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.75,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3784,7 +3671,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConsequenceControl" + "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3796,45 +3689,29 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that changes Consequence" + "@value": "Level where Likelihood is High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Change Consequence" + "@value": "High Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingContractualObligation", + "@id": "https://w3id.org/dpv/risk/owl#JudicialPenalty", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N1802c2900f5b4c578896c91c3149381d" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -3842,60 +3719,79 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Contractual Obligations" + "@value": "Something that involves or causes judicial penalties to be paid" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Contractual Obligation" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0" + "@value": "Judicial Penalty" } ] }, { - "@id": "_:N1802c2900f5b4c578896c91c3149381d", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-html", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://www.w3.org/TR/html/" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/format": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - HTML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.html" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/specification" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentDetectionReport", + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples/owl#E0069" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3905,7 +3801,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@id": "https://w3id.org/dpv/owl#Status" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3917,31 +3813,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the detection of a Incident" + "@value": "Status associated with an incident" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Detection Report" + "@value": "Incident Status" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#causedByVulnerability", + "@id": "https://w3id.org/dpv/risk/owl#ExtremelyHighSeverity", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" + "https://w3id.org/dpv/owl#Severity", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3949,6 +3851,11 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -3958,23 +3865,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the associated context (subject) is caused by the indicated vulnerability (object)" + "@value": "Level where Severity is Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "caused by vulnerability" + "@value": "Extremely High Severity" } ], - "https://schema.org/rangeIncludes": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L1", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S1L1", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -3993,7 +3901,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.14,xsd:decimal" + "@value": "0.11,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4003,7 +3911,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4015,45 +3923,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:7 L:1)" + "@value": "Low Risk (RM3x3 S:1 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataModification", + "@id": "https://w3id.org/dpv/risk/owl#IntegrityBreach", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Naa83e8f3fb5e4e9a88398292112d68f3" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -4061,7 +3947,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#DataBreach" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4069,57 +3958,18 @@ "@language": "en", "@value": "accepted" } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Modification" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Unauthorised Data Modification" - } - ] - }, - { - "@id": "_:Naa83e8f3fb5e4e9a88398292112d68f3", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" - } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VeryLowSeverity", + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityIncident", "@type": [ - "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.1,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4129,10 +3979,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4144,27 +3991,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Very Low" + "@value": "Incident where the confidentiality of information or system has been affected" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" + "@value": "Confidentiality Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L1", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L6", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4180,7 +4021,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.06,xsd:decimal" + "@value": "0.49,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4202,21 +4043,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:3 L:1)" + "@value": "Very High Risk (RM7x7 S:4 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PhysicalHarm", + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4226,7 +4067,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4235,35 +4076,29 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concepts associated with security threats that are likely to originate externally" + } + ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Physical Harm" + "@value": "External Security Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Reidentification", + "@id": "https://w3id.org/dpv/risk/owl#IncidentAssessmentReport", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4273,7 +4108,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4285,29 +4120,70 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Re-identification" + "@value": "A report describing the assessment of an incident in terms of its effects or impacts" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Re-identification" + "@value": "Incident Assessment Report" } + ] + }, + { + "@id": "https://w3id.org/dpv/examples", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@language": "en", - "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification" + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Examples for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/examples" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#InternalSecurityThreat", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L1", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.08,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -4315,7 +4191,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4327,21 +4203,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Concepts associated with security threats and issues that originate within the organisation" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Internal Security Threat" + "@value": "Extremely Low Risk (RM7x7 S:4 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IdentityFraud", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L4", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4355,15 +4231,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nbc1a7f7ae94c4fde84913e9622b759f6" + "@value": "0.32,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4373,7 +4243,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4385,34 +4255,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Identity Fraud" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identity Fraud" - } - ] - }, - { - "@id": "_:Nbc1a7f7ae94c4fde84913e9622b759f6", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "Moderate Risk (RM5x5 S:2 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseNegotiatingCapacity", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeDisclosure", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -4437,7 +4291,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd8a232e440f041b496b97da8007b588a" + "@id": "_:Nc4c391b305be479eb0e623d887a478ac" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4447,7 +4301,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4459,42 +4316,53 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Negotiating Capacity" + "@value": "Something that acts as or causes Unauthorised Code Disclosure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Negotiating Capacity" + "@value": "Unauthorised Code Disclosure" } ] }, { - "@id": "_:Nd8a232e440f041b496b97da8007b588a", + "@id": "_:Nc4c391b305be479eb0e623d887a478ac", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentMitigationMeasure", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S2L2", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.44,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4504,7 +4372,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskMitigationMeasure" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4516,21 +4384,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Mitigation Measure" + "@value": "Moderate Risk (RM3x3 S:2 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ModerateSeverity", + "@id": "https://w3id.org/dpv/risk/owl#DistributedDenialServiceAttack", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Severity", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4541,12 +4409,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.5,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N64ebcf10636d495599fc0fd262e44103" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4556,13 +4430,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" }, { - "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4574,86 +4445,53 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Moderate" + "@value": "Something that acts as or causes Distributed Denial of Service Attack (DDoS)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" + "@value": "Distributed Denial of Service Attack (DDoS)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk", + "@id": "_:N64ebcf10636d495599fc0fd262e44103", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/owl#RiskConcept" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "Risks and issues that arise during operational processes" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Operational Security Risk" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Fee", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L5", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@language": "en", - "@value": "DGA 2.10" + "@value": "0.10,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4663,35 +4501,46 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides fees e.g. for using a service" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Fee" + "@value": "Very Low Risk (RM7x7 S:1 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat", + "@id": "https://w3id.org/dpv/risk/owl#MonitorConsequence", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -4699,7 +4548,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4711,32 +4560,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Concepts associated with security threats that are likely to originate externally" + "@value": "Control that monitors a Risk Consequence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "External Security Threat" + "@value": "Monitor Consequence" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RightsExercisePrevention", + "@id": "https://w3id.org/dpv/risk/owl#SexualViolence", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -4745,6 +4594,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Ncb4b4f28b9894b79bfd2a5d2dd41f88f" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -4752,7 +4606,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4764,33 +4618,47 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Prevent Exercising of Rights" + "@value": "Something that acts as or causes Sexual Violence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Prevent Exercising of Rights" + "@value": "Sexual Violence" + } + ] + }, + { + "@id": "_:Ncb4b4f28b9894b79bfd2a5d2dd41f88f", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ReductionControl", + "@id": "https://w3id.org/dpv/risk/owl#causedByThreat", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskControl", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" + ], + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Threat" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4798,11 +4666,6 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -4812,20 +4675,25 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that reduces the likelihood or severity of an event" + "@value": "Indicates the cause of associated context (subject) was the indicated threat (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reduction Control" + "@value": "caused by threat" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseOpportunity", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L4", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -4840,15 +4708,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N0e6dade5a2814d0f815e1c5dd41f1c65" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4858,7 +4720,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4870,37 +4732,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Opportunity" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Opportunity" - } - ] - }, - { - "@id": "_:N0e6dade5a2814d0f815e1c5dd41f1c65", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Low Risk (RM5x5 S:1 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L1", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4914,6 +4760,11 @@ "@value": "2022-08-17" } ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.02,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -4921,7 +4772,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4933,37 +4784,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix 5x5" + "@value": "Extremely Low Risk (RM7x7 S:1 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S3L3", + "@id": "https://w3id.org/dpv/risk/owl#AccidentalIncident", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.99,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4973,7 +4813,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4985,21 +4825,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High" + "@value": "Incident caused due to accidental actions arising from human or human-controlled situations" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM3x3 S:3 L:3)" + "@value": "Accidental Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentNearMiss", + "@id": "https://w3id.org/dpv/risk/owl#IncidentOngoing", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#IncidentStatus", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5032,37 +4872,48 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The state where an incident was almost successful in taking place i.e. \"it came very close\"" + "@value": "The incident is ongoing i.e. still active" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Near Miss" + "@value": "Incident Ongoing" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ContainmentControl", + "@id": "https://w3id.org/dpv/risk/owl#Discrimination", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-19" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" } ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5074,51 +4925,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to contain event" + "@value": "Something that acts as or causes Discrimination" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Containment Control" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/json-ld11/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/application/ld+json" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - JSON-LD serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk-owl.jsonld" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@value": "Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels", + "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels", "@type": [ - "https://w3id.org/dpv/owl#Severity", + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -5140,7 +4960,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Severity" + "@id": "https://w3id.org/dpv/owl#Likelihood" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5152,19 +4972,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 5 Severity Levels from Very High to Very Low" + "@value": "Scale with 5 Likelihood Levels from Very High to Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "5 Severity Levels" + "@value": "5 Likelihood Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentRegister", + "@id": "https://w3id.org/dpv/risk/owl#ReduceLikelihood", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -5186,7 +5007,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RecordsOfActivities" + "@id": "https://w3id.org/dpv/risk/owl#ReductionControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5198,21 +5019,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A register recording incidentes, their reports, notifications, and other related activities" + "@value": "Control that reduces the likelihood of an event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Register" + "@value": "Reduce Likelihood" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ShareRisk", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S3L1", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5223,7 +5044,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.33,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5233,7 +5059,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5245,21 +5071,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that shares Risk e.g. amongst stakeholders" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Share Risk" + "@value": "Moderate Risk (RM3x3 S:3 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L2", + "@id": "https://w3id.org/dpv/risk/owl#IncidentSuspected", "@type": [ + "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5270,12 +5096,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.20,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5285,7 +5106,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5297,21 +5118,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" + "@value": "The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:5 L:2)" + "@value": "Incident Suspected" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L4", + "@id": "https://w3id.org/dpv/risk/owl#LoseReputation", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5325,9 +5146,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.16,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N90d89ca8a8594ecabee31205aee25395" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5337,7 +5164,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5349,67 +5176,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" + "@value": "Something that acts as or causes Loss of Reputation" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:1 L:4)" + "@value": "Lose of Reputation" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#isVulnerabilityOf", + "@id": "_:N90d89ca8a8594ecabee31205aee25395", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" - ], - "http://purl.org/dc/dcam/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Indicates the vulnerability (subject) is associated with indicated context (object)" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "is vulnerability of" + "@value": "ISO/IEC 27005:2018" } ], - "https://schema.org/domainIncludes": [ + "https://schema.org/url": [ { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VeryLowLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L6", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5420,12 +5217,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.1,xsd:decimal" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5435,10 +5232,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5450,24 +5244,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" + "@value": "Very Low Risk (RM7x7 S:1 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L3", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S1L2", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -5486,7 +5274,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.24,xsd:decimal" + "@value": "0.22,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5496,7 +5284,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5508,20 +5296,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:2 L:3)" + "@value": "Low Risk (RM3x3 S:1 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Injury", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L3", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -5536,15 +5324,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N1ef56bb9fadb431ba4c270603c7acdec" + "@value": "0.18,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5554,7 +5336,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5566,53 +5348,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Injury" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Injury" - } - ] - }, - { - "@id": "_:N1ef56bb9fadb431ba4c270603c7acdec", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Low Risk (RM7x7 S:3 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L4", + "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-02-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.33,xsd:decimal" + "@language": "en", + "@value": "ISO 31073:2022 Risk management vocabulary" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5622,7 +5383,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskManagement" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5634,36 +5395,46 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High" + "@value": "Assessment of risk involving its identification, analysis, and evaluation" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:4 L:4)" + "@value": "Risk Assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentConcludingReport", + "@id": "https://w3id.org/dpv/risk/owl#refersToRisk", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@id": "https://w3id.org/dpv/owl#Incident" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://w3id.org/dpv/owl#Risk" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples/owl#E0069" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5675,21 +5446,31 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known" + "@value": "Indicates the incident (subject) is a materialisation of the indicated risk (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Concluding Report" + "@value": "refers to risk" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/owl#Incident" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/owl#Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LowRisk", + "@id": "https://w3id.org/dpv/risk/owl#ModerateRisk", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskLevel", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5705,7 +5486,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.25,xsd:decimal" + "@value": "0.5,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5715,13 +5496,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" }, { "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" }, { - "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5733,26 +5514,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Low" + "@value": "Level where Risk is Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk" + "@value": "Moderate Risk" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" + "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentConcluded", + "@id": "https://w3id.org/dpv/risk/owl#ModerateLikelihood", "@type": [ - "https://w3id.org/dpv/risk/owl#IncidentStatus", + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -5764,7 +5545,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.5,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5774,7 +5560,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5786,26 +5578,43 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring" + "@value": "Level where Likelihood is Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Concluded" + "@value": "Moderate Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentOngoingReport", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L1", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5815,7 +5624,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5827,21 +5636,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Ongoing Report" + "@value": "Very Low Risk (RM5x5 S:2 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L1", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L2", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5857,7 +5666,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.10,xsd:decimal" + "@value": "0.04,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5879,23 +5688,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:5 L:1)" + "@value": "Extremely Low Risk (RM7x7 S:1 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IntentionalMisuse", + "@id": "https://w3id.org/dpv/risk/owl#ImpactControl", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -5903,7 +5723,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5915,39 +5735,68 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Intentional Misuse" + "@value": "Risk Mitigation Measure that controls Impacts" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Intentional Misuse" + "@value": "Impact Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S2L3", + "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "0.67,xsd:decimal" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes an attack on security with the aim of undermining it" } ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Security Attack" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -5955,7 +5804,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5967,37 +5816,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + "@value": "Risks and issues that affect the reputation of the organisation" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM3x3 S:2 L:3)" + "@value": "Reputational Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L3", + "@id": "https://w3id.org/dpv/risk/owl#SocialDisadvantage", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.12,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6007,7 +5857,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6019,52 +5869,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" + "@value": "Something that acts as or causes Social Disadvantage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:2 L:3)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/turtle/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/turtle" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - Turtle serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk-owl.ttl" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@value": "Social Disadvantage" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L4", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataDisclosure", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6078,9 +5897,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.49,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N7c66233cabb64c2486ae612a1ff6b01d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6090,7 +5915,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6102,63 +5930,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High" + "@value": "Something that acts as or causes Unauthorised Data Disclosure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:6 L:4)" + "@value": "Unauthorised Data Disclosure" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IdentificationControl", + "@id": "_:N7c66233cabb64c2486ae612a1ff6b01d", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskControl", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "Control to identify characteristics of event" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Identification Control" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#HighRisk", + "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskLevel", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6169,12 +5971,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.75,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nb3034bc7cf1e485b85582c21529ebaa4" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6184,13 +5992,16 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" }, { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" }, { - "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6202,69 +6013,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is High" + "@value": "Something that acts as or causes Security Breach" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" + "@value": "Security Breach" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ComponentMalfunction", + "@id": "_:Nb3034bc7cf1e485b85582c21529ebaa4", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Component Malfunction" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "Component Malfunction" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ModerateLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#ShareRisk", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Likelihood", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6275,12 +6054,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.5,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6290,13 +6064,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6308,37 +6076,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Moderate" + "@value": "Risk Mitigation Measure that shares Risk e.g. amongst stakeholders" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" + "@value": "Share Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Privacy", + "@id": "https://w3id.org/dpv/risk/owl#hasVulnerability", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6347,15 +6114,26 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Indicates the associated context (subject) has indicated vulnerability (object)" + } + ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Privacy" + "@value": "has vulnerability" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Coercion", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingCodeOfConduct", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -6380,7 +6158,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N61513676426149faae9e58063eb667d8" + "@id": "_:Nb240be91051241df8fe71581eedea8cc" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6390,49 +6168,55 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Coercion" + "@value": "Something that acts as or causes Violation of Code of Conduct" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Coercion" + "@value": "Violating Code of Conduct" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0" } ] }, { - "@id": "_:N61513676426149faae9e58063eb667d8", + "@id": "_:Nb240be91051241df8fe71581eedea8cc", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SystemIntrusion", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L5", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6446,15 +6230,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N7a5848cbabb14c8ea2d162432eba32f0" + "@value": "0.41,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6464,7 +6242,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6476,48 +6254,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Intrusion" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Intrusion" - } - ] - }, - { - "@id": "_:N7a5848cbabb14c8ea2d162432eba32f0", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "High Risk (RM7x7 S:4 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentMitigated", + "@id": "https://w3id.org/dpv/risk/owl#IncidentHandlingReport", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6527,7 +6283,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6539,26 +6295,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring" + "@value": "A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Mitigated" + "@value": "Incident Handling Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Threat", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L4", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6568,7 +6335,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskSource" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6580,39 +6347,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk source event which causes Risk" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Threat" + "@value": "Low Risk (RM7x7 S:2 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L2", + "@id": "https://w3id.org/dpv/risk/owl#AccidentalMisuse", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.29,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -6620,7 +6371,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6632,21 +6383,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate" + "@value": "Accidental Misuse" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:7 L:2)" + "@value": "Accidental Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Cryptojacking", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L4", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6660,15 +6411,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Neb960f38438d48258bee0ebae96be48e" + "@value": "0.33,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6678,7 +6423,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6690,37 +6435,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Cryptojacking" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cryptojacking" - } - ] - }, - { - "@id": "_:Neb960f38438d48258bee0ebae96be48e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Landscape 2021" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" + "@value": "High Risk (RM7x7 S:4 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L2", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L2", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6736,7 +6465,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.32,xsd:decimal" + "@value": "0.40,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6758,21 +6487,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:4 L:2)" + "@value": "High Risk (RM5x5 S:5 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Scam", + "@id": "https://w3id.org/dpv/risk/owl#EquipmentFailure", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6794,7 +6523,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N498890541a5449e290f0aea406ea5090" + "@id": "_:N8e86fbf714a04b25a51dfcacec1cb10e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6804,7 +6533,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6816,18 +6548,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Scam" + "@value": "Something that acts as or causes Equipment Failure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Scam" + "@value": "Equipment Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here equipment refers to physical equipment" } ] }, { - "@id": "_:N498890541a5449e290f0aea406ea5090", + "@id": "_:N8e86fbf714a04b25a51dfcacec1cb10e", "@type": [ "https://schema.org/WebPage" ], @@ -6843,10 +6581,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Extorsion", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L6", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6860,15 +6598,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N40f94dff19814aa6ae7d3074eb3409d8" + "@value": "0.37,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6878,7 +6610,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6890,48 +6622,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Extorsion" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extorsion" - } - ] - }, - { - "@id": "_:N40f94dff19814aa6ae7d3074eb3409d8", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "High Risk (RM7x7 S:3 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorImpact", + "@id": "https://w3id.org/dpv/risk/owl#RightsExercisePrevention", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6941,7 +6663,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6953,23 +6675,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Impact" + "@value": "Something that acts as or causes Prevent Exercising of Rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Impact" + "@value": "Prevent Exercising of Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks", + "@id": "https://w3id.org/dpv/risk/owl#IncidentDetectionReport", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -6977,7 +6710,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6989,21 +6722,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Concepts associated with risks that arise due to User or Human use" + "@value": "A report describing the detection of a Incident" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "User Risks" + "@value": "Incident Detection Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L3", + "@id": "https://w3id.org/dpv/risk/owl#Spoofing", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -7017,9 +6750,18 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.18,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N0085b3ac0b474cf1a64eccdff3718c8d" + }, + { + "@id": "_:N539160303302464aa341bdfa53068f22" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7029,7 +6771,16 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7041,32 +6792,69 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + "@value": "Something that acts as or causes Spoofing" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:3 L:3)" + "@value": "Spoofing" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskSource", + "@id": "_:N0085b3ac0b474cf1a64eccdff3718c8d", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "_:N539160303302464aa341bdfa53068f22", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L2", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.32,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7076,7 +6864,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7088,259 +6876,106 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Source" + "@value": "Moderate Risk (RM5x5 S:4 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#", + "@id": "https://w3id.org/dpv/risk/owl#InterceptCommunications", "@type": [ - "http://www.w3.org/ns/dx/prof/Profile", - "http://www.w3.org/2002/07/owl#Ontology" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/bibliographicCitation": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@value": "http://www.w3.org/2004/02/skos/core" - }, + "http://purl.org/dc/terms/created": [ { - "@id": "http://www.w3.org/2002/07/owl" - }, - { - "@value": "http://www.w3.org/2000/01/rdf-schema" - } - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Axel Polleres" - }, - { - "@value": "Rob Brennan" - }, - { - "@value": "Julian Flake" - }, - { - "@value": "Fajar Ekaputra" - }, - { - "@value": "Beatriz Esteves" - }, - { - "@value": "Julio Fernandez" - }, - { - "@value": "Delaram Golpayegani" - }, - { - "@value": "Georg P. Krog" - }, - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@language": "en", - "@value": "2022-08-14" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/creator": [ - { - "@language": "en", - "@value": "Delaram Golpayegani" - }, - { - "@language": "en", - "@value": "Beatriz Esteves" - }, - { - "@language": "en", - "@value": "Julian Flake" - }, - { - "@language": "en", - "@value": "Rob Brennan" - }, - { - "@language": "en", - "@value": "Harshvardhan J. Pandit" - }, - { - "@language": "en", - "@value": "Paul Ryan" - }, + "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "Georg P. Krog" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/description": [ + "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" + "@id": "_:N1f36b972c50f49fb9b474152b57cf474" } ], - "http://purl.org/dc/terms/hasVersion": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/identifier": [ - { - "@value": "https://w3id.org/dpv/risk" - } - ], - "http://purl.org/dc/terms/issued": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@language": "en", - "@value": "2022-08-14" - } - ], - "http://purl.org/dc/terms/license": [ + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, { - "@id": "https://www.w3.org/copyright/document-license-2023/" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "2024-07-13" - } - ], - "http://purl.org/dc/terms/publisher": [ - { - "@id": "https://www.w3.org/" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "https://www.w3.org/groups/cg/dpvcg/" + "@value": "modified" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Concepts" - } - ], - "http://purl.org/ontology/bibo/doi": [ - { - "@value": "10.5281/zenodo.12505841" - } - ], - "http://purl.org/ontology/bibo/status": [ - { - "@value": "http://purl.org/ontology/bibo/status/published" - } - ], - "http://purl.org/vocab/vann/preferredNamespacePrefix": [ - { - "@value": "risk" - } - ], - "http://purl.org/vocab/vann/preferredNamespaceUri": [ - { - "@value": "https://w3id.org/dpv/risk#" + "@value": "Something that acts as or causes Interception of Communications" } ], - "http://www.w3.org/2000/01/rdf-schema#Label": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "RISK" - } - ], - "http://www.w3.org/2002/07/owl#versionIRI": [ - { - "@id": "https://w3id.org/dpv/2.1-dev/risk/owl#" - } - ], - "http://www.w3.org/2002/07/owl#versionInfo": [ - { - "@value": "2.1-dev" - } - ], - "http://www.w3.org/ns/dx/prof/hasResource": [ - { - "@id": "https://w3id.org/dpv/guides" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-html" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3" - }, - { - "@id": "https://w3id.org/dpv/examples" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf" - }, - { - "@id": "https://w3id.org/dpv/primer" + "@value": "Intercept Communications" } ], - "http://www.w3.org/ns/dx/prof/isProfileOf": [ - { - "@id": "http://www.w3.org/2002/07/owl" - }, - { - "@id": "https://w3id.org/dpv/owl" - }, + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@language": "en", + "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0" } + ] + }, + { + "@id": "_:N1f36b972c50f49fb9b474152b57cf474", + "@type": [ + "https://schema.org/WebPage" ], - "http://xmlns.com/foaf/0.1/logo": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/media/logo.png" + "@value": "ISO/IEC 27005:2018" } ], - "https://schema.org/version": [ + "https://schema.org/url": [ { - "@value": "2.1-dev" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LowSeverity", + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Severity", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.25,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -7348,13 +6983,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7366,24 +6995,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Low" + "@value": "Risks and issues that have their basis in legal requirements and enforcement" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" + "@value": "Legal Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VulnerabilityCreated", + "@id": "https://w3id.org/dpv/risk/owl#Fraud", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -7408,7 +7031,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nc0018c079b6b42619d869b3ae63ec70a" + "@id": "_:N0328e4baf7504ceb93cd9bbab8b23099" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7418,7 +7041,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#InternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7430,18 +7056,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Vulnerability Created" + "@value": "Something that acts as or causes Fraud" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Vulnerability Created" + "@value": "Fraud" } ] }, { - "@id": "_:Nc0018c079b6b42619d869b3ae63ec70a", + "@id": "_:N0328e4baf7504ceb93cd9bbab8b23099", "@type": [ "https://schema.org/WebPage" ], @@ -7457,58 +7083,58 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-html", + "@id": "https://w3id.org/dpv/risk/owl#MonitorImpact", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/title": [ + "http://purl.org/dc/terms/created": [ { - "@value": "Risk Concepts - HTML serialiation" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.html" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/specification" + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L1", - "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "Harshvardhan J. Pandit" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@language": "en", + "@value": "Control that monitors a Risk Impact" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "0.20,xsd:decimal" + "@language": "en", + "@value": "Monitor Impact" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Privacy", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -7517,7 +7143,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7526,29 +7152,34 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low" - } - ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:5 L:1)" + "@value": "Privacy" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentSuspectedReport", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L7", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.57,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7558,7 +7189,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7570,21 +7201,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the suspicion of an incident in the past or occuring" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Suspected Report" + "@value": "Very High Risk (RM7x7 S:4 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VeryLowRisk", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L1", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -7595,12 +7226,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.1,xsd:decimal" + "@value": "0.14,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7610,10 +7241,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7625,38 +7253,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" + "@value": "Low Risk (RM7x7 S:7 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels", + "@id": "https://w3id.org/dpv/risk/owl#IncidentPreliminaryReport", "@type": [ - "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7666,7 +7282,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskLevel" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7678,37 +7294,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 5 Risk Levels from Very High to Very Low" + "@value": "A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "5 Risk Levels" + "@value": "Incident Preliminary Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L4", + "@id": "https://w3id.org/dpv/risk/owl#RemedyControl", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.57,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7718,7 +7324,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7730,21 +7336,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High" + "@value": "Control to remedy consequences of event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:7 L:4)" + "@value": "Remedy Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingEthicsCode", + "@id": "https://w3id.org/dpv/risk/owl#ViolenceAgainstChildren", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -7766,7 +7372,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd8ddc1f8024a4418b62c344837cff0cd" + "@id": "_:N50def33314ee4442bf7e77161e51165b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7776,55 +7382,55 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Ethics Code" + "@value": "Something that acts as or causes Child Violence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Ethics Code" + "@value": "Violence against children" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0" + "@value": "This concept was called \"ChildViolence\" in DPV 2.0" } ] }, { - "@id": "_:Nd8ddc1f8024a4418b62c344837cff0cd", + "@id": "_:N50def33314ee4442bf7e77161e51165b", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L5", + "@id": "https://w3id.org/dpv/risk/owl#VeryLowSeverity", "@type": [ + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -7835,12 +7441,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.10,xsd:decimal" + "@value": "0.1,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7850,7 +7456,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7862,21 +7471,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low" + "@value": "Level where Severity is Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:1 L:5)" + "@value": "Very Low Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L5", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -7887,7 +7502,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.51,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7897,7 +7517,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7909,26 +7529,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that uses controls to monitor events" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Control" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised." + "@value": "Very High Risk (RM7x7 S:5 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -7942,11 +7557,6 @@ "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N837e146fba804365b9e619c05849f3d1" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -7954,7 +7564,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment" + "@id": "https://w3id.org/dpv/owl#RiskLevel" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7965,38 +7575,22 @@ ], "http://www.w3.org/2004/02/skos/core#definition": [ { - "@language": "en", - "@value": "A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Risk Analysis" - } - ] - }, - { - "@id": "_:N837e146fba804365b9e619c05849f3d1", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "IEC 31010:2019" + "@language": "en", + "@value": "Scale with 5 Risk Levels from Very High to Very Low" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "https://www.iso.org/standard/72140.html" + "@language": "en", + "@value": "5 Risk Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L3", + "@id": "https://w3id.org/dpv/risk/owl#ErroneousSystemUse", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -8010,9 +7604,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.60,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N258e312c37aa4354bed73603ef7a36f6" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8022,7 +7622,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8034,26 +7634,54 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High" + "@value": "Something that acts as or causes Erroneous System Use" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:5 L:3)" + "@value": "Erroneous System Use" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityIncident", + "@id": "_:N258e312c37aa4354bed73603ef7a36f6", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedReidentification", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-19" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8063,7 +7691,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8075,18 +7706,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident where the integrity of information or system has been affected" + "@value": "Something that acts as or causes Unauthorised Re-Identification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Integrity Incident" + "@value": "Unauthorised Re-Identification" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Reward", + "@id": "https://w3id.org/dpv/risk/owl#SystemFailure", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -8094,13 +7725,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -8109,6 +7740,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nd794c9a0064e4fe6bb3a0ebd38859b9b" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -8116,7 +7752,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8128,39 +7767,44 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee" + "@value": "Something that acts as or causes System Failure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reward" + "@value": "System Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here system refers to both hardware and software systems" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Benefit", + "@id": "_:Nd794c9a0064e4fe6bb3a0ebd38859b9b", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" - } + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/name": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" + "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" } ], - "http://purl.org/dc/terms/modified": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -8169,7 +7813,16 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8181,32 +7834,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes benefits" + "@value": "Something that acts as or causes Unauthorised Activity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Benefit" + "@value": "Unauthorised Activity" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentSuspected", + "@id": "https://w3id.org/dpv/risk/owl#Payment", "@type": [ - "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-04-14" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8216,7 +7875,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8228,21 +7887,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing" + "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Suspected" + "@value": "Payment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ModerateRisk", + "@id": "https://w3id.org/dpv/risk/owl#MaliciousCodeAttack", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskLevel", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -8253,12 +7912,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.5,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N625dc3c061c74eec9f96d171c60fd3c0" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8268,13 +7933,16 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" }, { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" }, { - "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8286,25 +7954,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Moderate" + "@value": "Something that acts as or causes Malicious Code Attack" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk" + "@value": "Malicious Code Attack" + } + ] + }, + { + "@id": "_:N625dc3c061c74eec9f96d171c60fd3c0", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentImpactAssessment", + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels", "@type": [ + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -8316,7 +7995,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8326,7 +8005,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#ImpactAssessment" + "@id": "https://w3id.org/dpv/owl#Severity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8338,21 +8017,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "An impact assessment associated with a incident" + "@value": "Scale with 7 Severity Levels from Extremely High to Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Impact Assessment" + "@value": "7 Severity Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MaterialDamage", + "@id": "https://w3id.org/dpv/risk/owl#VeryHighSeverity", "@type": [ + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -8363,13 +8042,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.9,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8379,7 +8057,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8391,27 +8072,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Material Damage" + "@value": "Level where Severity is Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Material Damage" + "@value": "Very High Severity" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" + "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#FinancialLoss", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L2", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -8425,15 +8106,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N0296c48d481641d492572a05652b6bf5" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8443,7 +8118,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8455,54 +8130,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Financial Loss" - } - ] - }, - { - "@id": "_:N0296c48d481641d492572a05652b6bf5", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "Low Risk (RM7x7 S:4 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Discrimination", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L2", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8512,7 +8170,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8524,23 +8182,39 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Discrimination" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Discrimination" + "@value": "Moderate Risk (RM5x5 S:3 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L5", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.80,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -8548,7 +8222,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8560,21 +8234,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that affect the reputation of the organisation" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reputational Risk" + "@value": "Very High Risk (RM5x5 S:4 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L4", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L7", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -8590,7 +8264,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.64,xsd:decimal" + "@value": "0.43,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8600,7 +8274,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8612,20 +8286,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:4 L:4)" + "@value": "Very High Risk (RM7x7 S:3 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L5", "@type": [ - "https://w3id.org/dpv/owl#Likelihood", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -8637,7 +8311,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8647,7 +8326,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Likelihood" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8659,18 +8338,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 7 Likelihood Levels from Extremely High to Extremely Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "7 Likelihood Levels" + "@value": "Low Risk (RM5x5 S:1 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RightsViolation", + "@id": "https://w3id.org/dpv/risk/owl#UnwantedDataDeletion", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -8678,13 +8357,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -8693,6 +8372,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nde382e9a51c445d69476b298827b1cbe" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -8700,7 +8384,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8712,29 +8402,55 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Rights" + "@value": "Something that acts as or causes Unwanted Data Deletion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Rights" + "@value": "Unwanted Data Deletion" } + ] + }, + { + "@id": "_:Nde382e9a51c445d69476b298827b1cbe", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0" + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L5", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.99,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -8742,7 +8458,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8754,21 +8470,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that have their basis in legal requirements and enforcement" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Legal Risk" + "@value": "Very High Risk (RM5x5 S:5 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L2", + "@id": "https://w3id.org/dpv/risk/owl#LoseCredibility", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -8782,9 +8498,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.16,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N2c068c379d9b4c2b8da0937ad8be6a81" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8794,7 +8516,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8806,20 +8528,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + "@value": "Something that acts as or causes Loss of Credibility" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:2 L:2)" + "@value": "Lose of Credibility" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L5", + "@id": "_:N2c068c379d9b4c2b8da0937ad8be6a81", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels", + "@type": [ + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -8831,12 +8569,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.20,xsd:decimal" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8846,7 +8579,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/owl#Severity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8858,18 +8591,48 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low" + "@value": "Scale with 5 Severity Levels from Very High to Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:1 L:5)" + "@value": "5 Severity Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L6", + "@id": "https://w3id.org/dpv/risk/owl#PhysicalHarm", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Physical Harm" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L2", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -8910,31 +8673,43 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:1 L:6)" + "@value": "Very Low Risk (RM7x7 S:3 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#hasIncident", + "@id": "https://w3id.org/dpv/risk/owl#PhishingScam", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nb657a11b610f419a86eb9ea4a94e7e37" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8942,6 +8717,14 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -8951,23 +8734,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates an incident is associated with the specified context" + "@value": "Something that acts as or causes Phishing Scam" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has incident" + "@value": "Phishing Scam" } + ] + }, + { + "@id": "_:Nb657a11b610f419a86eb9ea4a94e7e37", + "@type": [ + "https://schema.org/WebPage" ], - "https://schema.org/rangeIncludes": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DistributedDenialServiceAttack", + "@id": "https://w3id.org/dpv/risk/owl#Coercion", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -8992,7 +8786,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N842f6dd3b92c482180f56ce6a495c382" + "@id": "_:Nc78302d156fb497aae9594fa63bb9fa7" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9001,6 +8795,9 @@ } ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, { "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } @@ -9014,37 +8811,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Distributed Denial of Service Attack (DDoS)" + "@value": "Something that acts as or causes Coercion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Distributed Denial of Service Attack (DDoS)" + "@value": "Coercion" } ] }, { - "@id": "_:N842f6dd3b92c482180f56ce6a495c382", + "@id": "_:Nc78302d156fb497aae9594fa63bb9fa7", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L5", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L6", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9060,7 +8857,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.60,xsd:decimal" + "@value": "0.61,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9070,7 +8867,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9082,39 +8879,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:3 L:5)" + "@value": "Extremely High Risk (RM7x7 S:5 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L2", + "@id": "https://w3id.org/dpv/risk/owl#EnvironmentalRisk", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.04,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -9122,7 +8903,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9134,37 +8915,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low" + "@value": "Risks and issues that have their origin in environment or can affect the environment at large" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:1 L:2)" + "@value": "Environmental Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L3", + "@id": "https://w3id.org/dpv/risk/owl#ReductionControl", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.37,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9174,7 +8945,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9186,37 +8957,31 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" + "@value": "Control that reduces the likelihood or severity of an event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:6 L:3)" + "@value": "Reduction Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L6", + "@id": "https://w3id.org/dpv/risk/owl#RiskControl", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/vocab/vann/example": [ { - "@value": "0.37,xsd:decimal" + "@id": "https://w3id.org/dpv/examples/owl#E0071" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9226,7 +8991,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/owl#RiskMitigationMeasure" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9238,27 +9003,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" + "@value": "Control that modifies risk" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:3 L:6)" + "@value": "Risk Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#causedByThreat", + "@id": "https://w3id.org/dpv/risk/owl#exploitsVulnerability", "@type": [ "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/dcam/domainIncludes": [ { "@id": "https://w3id.org/dpv/risk/owl#Threat" } ], + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", @@ -9279,26 +9049,31 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the cause of associated context (subject) was the indicated threat (object)" + "@value": "Indicates the threat (subject) exploits the indicated vulnerability (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "caused by threat" + "@value": "exploits vulnerability" } ], - "https://schema.org/rangeIncludes": [ + "https://schema.org/domainIncludes": [ { "@id": "https://w3id.org/dpv/risk/owl#Threat" } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LowLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L5", "@type": [ - "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9309,12 +9084,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.25,xsd:decimal" + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9324,13 +9099,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9342,37 +9111,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" + "@value": "Low Risk (RM7x7 S:2 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#hasVulnerability", + "@id": "https://w3id.org/dpv/risk/owl#Damage", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-03-30" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9380,6 +9150,11 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -9389,26 +9164,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the associated context (subject) has indicated vulnerability (object)" + "@value": "Something that acts as or causes Damage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has vulnerability" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@value": "Damage" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedResourceUse", + "@id": "https://w3id.org/dpv/risk/owl#DataCorruption", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9428,9 +9198,75 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N8aaec0d1fefb4744abcf3099509b1988" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "modified" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Corruption of Data" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Data Corruption" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"Corruption Data\" in DPV 2.0" + } + ] + }, + { + "@id": "_:N8aaec0d1fefb4744abcf3099509b1988", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#CrossBorderIncident", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ { - "@id": "_:Nd4175f97fd33423f9014c3d690d56fad" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9440,7 +9276,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9452,42 +9288,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Resource Use" + "@value": "Incident involving cross-border or multiple jurisdictions" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Resource Use" + "@value": "Cross-Border Incident" } ] }, { - "@id": "_:Nd4175f97fd33423f9014c3d690d56fad", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L3", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ThreatSource", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "0.60,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9497,7 +9328,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9509,18 +9340,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Source of threat event, including both agent and non-agent sources" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Threat Source" + "@value": "High Risk (RM5x5 S:5 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PhishingScam", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingContractualObligation", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -9545,7 +9376,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N2039355de6a7474a8ab35355297e33c6" + "@id": "_:N638499f1a35f4f94abab8a1e6e4bf97d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9555,64 +9386,60 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Phishing Scam" + "@value": "Something that acts as or causes Violation of Contractual Obligations" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Phishing Scam" + "@value": "Violation of Contractual Obligation" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0" } ] }, { - "@id": "_:N2039355de6a7474a8ab35355297e33c6", + "@id": "_:N638499f1a35f4f94abab8a1e6e4bf97d", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#isExploitedBy", + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityIncident", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" - ], - "http://purl.org/dc/dcam/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" - } - ], - "http://purl.org/dc/dcam/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Threat" - } + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9620,6 +9447,11 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Incident" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -9629,36 +9461,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the vulnerability (subject) is exploited by the indicated threat (object)" + "@value": "Incident where the availability of information or system has been affected" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "is exploited by" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Threat" + "@value": "Availability Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CrossBorderIncident", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L3", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9668,7 +9501,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9680,21 +9513,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident involving cross-border or multiple jurisdictions" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cross-Border Incident" + "@value": "Very Low Risk (RM5x5 S:1 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels", + "@id": "https://w3id.org/dpv/risk/owl#Harm", "@type": [ - "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9705,7 +9538,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-13" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9715,7 +9554,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Severity" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9727,21 +9566,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 7 Severity Levels from Extremely High to Extremely Low" + "@value": "Something that acts as or causes Harm to humans" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "7 Severity Levels" + "@value": "Harm" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept refers to the general abstract notion of harm" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExtremelyHighLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#IllegalDataProcessing", "@type": [ - "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9752,12 +9597,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.99,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nfbea264abf694083a7d1db8b2101092b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9767,7 +9618,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9779,27 +9630,43 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Extremely High" + "@value": "Something that acts as or causes Illegal Processing of Data" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Likelihood" + "@value": "Illegal Data Processing" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" + "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L5", + "@id": "_:Nfbea264abf694083a7d1db8b2101092b", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#MonitorRiskControl", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9810,12 +9677,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.31,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9825,7 +9687,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9837,47 +9699,67 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High" + "@value": "Control that monitors another Control" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:3 L:5)" + "@value": "Monitor Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L1", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://www.w3.org/TeamSubmission/n3/" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/format": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://www.iana.org/assignments/media-types/text/n3" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/title": [ { - "@value": "0.04,xsd:decimal" + "@value": "Risk Concepts - N3 serialiation" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://w3id.org/dpv/risk/risk-owl.n3" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#isVulnerabilityOf", + "@type": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" + ], + "http://purl.org/dc/dcam/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9889,21 +9771,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Indicates the vulnerability (subject) is associated with indicated context (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:2 L:1)" + "@value": "is vulnerability of" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L3", + "@id": "https://w3id.org/dpv/risk/owl#MonitorRisk", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9914,12 +9801,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.48,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9929,7 +9811,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9941,37 +9823,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + "@value": "Control that monitors a Risk" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:4 L:3)" + "@value": "Monitor Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L2", + "@id": "https://w3id.org/dpv/risk/owl#RiskManagement", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-06-12" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.08,xsd:decimal" + "@language": "en", + "@value": "ISO 31073:2022 Risk management vocabulary" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9981,7 +9858,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9993,18 +9870,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low" + "@value": "Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:2 L:2)" + "@value": "Risk Management" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L6", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L4", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -10023,7 +9900,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.86,xsd:decimal" + "@value": "0.57,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10045,32 +9922,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:7 L:6)" + "@value": "Very High Risk (RM7x7 S:7 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SystemMalfunction", + "@id": "https://w3id.org/dpv/risk/owl#Fee", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], "http://purl.org/dc/terms/modified": [ @@ -10081,7 +9958,8 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N1c2325e64024454ebc2e79f9e388cf3b" + "@language": "en", + "@value": "DGA 2.10" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10091,52 +9969,30 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Malfunction" + "@value": "Something that acts as or provides fees e.g. for using a service" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Malfunction" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here system refers to both hardware and software systems" - } - ] - }, - { - "@id": "_:N1c2325e64024454ebc2e79f9e388cf3b", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Fee" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Blackmail", + "@id": "https://w3id.org/dpv/risk/owl#SystemIntrusion", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -10161,7 +10017,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N3ef9f5a9eb554279905f69c263712205" + "@id": "_:Ne8bd9725515e46d0a941f4a4665a7868" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10170,8 +10026,17 @@ } ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, { "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10183,65 +10048,48 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Blackmail" + "@value": "Something that acts as or causes System Intrusion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Blackmail" + "@value": "System Intrusion" } ] }, { - "@id": "_:N3ef9f5a9eb554279905f69c263712205", + "@id": "_:Ne8bd9725515e46d0a941f4a4665a7868", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Incident", + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels", "@type": [ + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - }, - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples/owl#E0069" - }, - { - "@id": "https://w3id.org/dpv/examples/owl#E0070" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10251,10 +10099,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" - }, - { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv/owl#Likelihood" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10266,27 +10111,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "An actual or occured event" + "@value": "Scale with 7 Likelihood Levels from Extremely High to Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Incident is realised or materialised risk" + "@value": "7 Likelihood Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L6", + "@id": "https://w3id.org/dpv/risk/owl#MalwareAttack", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -10300,9 +10139,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.73,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6fb9cc1510c4401a9c582949b7a8c8b7" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10312,7 +10157,16 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10324,19 +10178,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High" + "@value": "Something that acts as or causes Malware Attack" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:6 L:6)" + "@value": "Malware Attack" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus", + "@id": "_:N6fb9cc1510c4401a9c582949b7a8c8b7", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L4", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -10348,12 +10219,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" } ], - "http://purl.org/vocab/vann/example": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/examples/owl#E0069" + "@value": "0.48,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10363,7 +10234,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Status" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10375,18 +10246,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Status associated with an incident" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Status" + "@value": "High Risk (RM5x5 S:3 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L3", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L1", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -10405,7 +10276,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.43,xsd:decimal" + "@value": "0.10,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10427,21 +10298,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:7 L:3)" + "@value": "Very Low Risk (RM7x7 S:5 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentHalted", + "@id": "https://w3id.org/dpv/risk/owl#VeryHighRisk", "@type": [ - "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -10452,7 +10323,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.9,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10462,7 +10338,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10474,38 +10353,43 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident has halted or paused with a high likelihood of resuming or recurring" + "@value": "Level where Risk is Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Halted" + "@value": "Very High Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RightsLimitation", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L5", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.61,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10515,7 +10399,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10527,27 +10411,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Limitation of Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Limitation of Rights" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0" + "@value": "Very High Risk (RM7x7 S:6 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RemoveConsequence", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L1", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -10558,7 +10436,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10568,7 +10451,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConsequenceControl" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10580,43 +10463,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that removes Consequence i.e. prevents it from materialising" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remove Consequence" + "@value": "Low Risk (RM5x5 S:5 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PublicOrderBreach", + "@id": "https://w3id.org/dpv/risk/owl#isExploitedBy", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv/risk/owl#Threat" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N2bd2812bbacb46319d2bdb0e95e02f65" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10624,11 +10500,6 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -10638,34 +10509,28 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Public Order Breach" + "@value": "Indicates the vulnerability (subject) is exploited by the indicated threat (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Public Order Breach" + "@value": "is exploited by" } - ] - }, - { - "@id": "_:N2bd2812bbacb46319d2bdb0e95e02f65", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "https://schema.org/domainIncludes": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ], - "https://schema.org/url": [ + "https://schema.org/rangeIncludes": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/risk/owl#Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L5", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L1", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -10684,7 +10549,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.61,xsd:decimal" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10706,53 +10571,44 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:6 L:5)" + "@value": "Very Low Risk (RM7x7 S:6 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3", + "@id": "https://w3id.org/dpv/risk/owl#AuthorisationFailure", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TeamSubmission/n3/" - } + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://www.iana.org/assignments/media-types/text/n3" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/title": [ + "http://purl.org/dc/terms/created": [ { - "@value": "Risk Concepts - N3 serialiation" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.n3" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://purl.org/dc/terms/source": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@id": "_:N588812d3250243469d4d5b0cbd82dc9e" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#JudicialPenalty", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -10761,7 +10617,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10773,52 +10635,89 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that involves or causes judicial penalties to be paid" + "@value": "Something that acts as or causes Authorisation Failure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Judicial Penalty" + "@value": "Authorisation Failure" } ] }, { - "@id": "https://w3id.org/dpv/guides", + "@id": "_:N588812d3250243469d4d5b0cbd82dc9e", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/conformsTo": [ + "https://schema.org/name": [ { - "@id": "https://www.w3.org/TR/html/" + "@value": "ENISa Trust Services Security Incidents 2021" } ], - "http://purl.org/dc/terms/format": [ + "https://schema.org/url": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L2", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/title": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "Guides for Data Privacy Vocabulary" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/guides" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@value": "0.16,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Low Risk (RM5x5 S:2 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L5", + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -10829,12 +10728,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.20,xsd:decimal" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10844,7 +10738,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/owl#RiskLevel" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10856,21 +10750,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" + "@value": "Scale with 7 Risk Levels from Extremely High to Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:2 L:5)" + "@value": "7 Risk Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnwantedDisclosureData", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedResourceUse", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -10892,7 +10786,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N12b2c9394da44250a5ab771adc23fab8" + "@id": "_:N605e2cac18a74200ab14cc33e319b6cb" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10903,6 +10797,9 @@ "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10914,18 +10811,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Disclosure of Data" + "@value": "Something that acts as or causes Unauthorised Resource Use" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Disclosure of Data" + "@value": "Unauthorised Resource Use" } ] }, { - "@id": "_:N12b2c9394da44250a5ab771adc23fab8", + "@id": "_:N605e2cac18a74200ab14cc33e319b6cb", "@type": [ "https://schema.org/WebPage" ], @@ -10941,12 +10838,28 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityBreach", + "@id": "https://w3id.org/dpv/risk/owl#ExtremelyLowLikelihood", "@type": [ + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.01,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -10954,7 +10867,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#DataBreach" + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10962,13 +10875,31 @@ "@language": "en", "@value": "accepted" } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Level where Likelihood is Extremely Low" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Extremely Low Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" + } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorConsequence", + "@id": "https://w3id.org/dpv/risk/owl#ExtremelyHighRisk", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -10976,10 +10907,15 @@ "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10989,7 +10925,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11001,21 +10937,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Consequence" + "@value": "Level where Risk is Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Consequence" + "@value": "Extremely High Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity", + "@id": "https://w3id.org/dpv/risk/owl#JudicialCosts", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11025,7 +10967,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11037,32 +10979,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Activity" + "@value": "Something that involves or causes judicial costs to be paid" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Activity" + "@value": "Judicial Costs" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Detriment", + "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccount", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -11071,6 +11013,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N252928e4ed0f4c6ea83876f7fb2c3d78" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -11078,7 +11025,16 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11090,79 +11046,48 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Detriment" + "@value": "Something that acts as or causes a compromised account that is then used by the compromiser" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Detriment" + "@value": "Compromise Account" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7", + "@id": "_:N252928e4ed0f4c6ea83876f7fb2c3d78", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Risk Matrix 7x7" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedReidentification", + "@id": "https://w3id.org/dpv/risk/owl#Benefit", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-03-23" } ], "http://purl.org/dc/terms/modified": [ @@ -11178,7 +11103,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11190,18 +11115,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Re-Identification" + "@value": "Something that acts as or causes benefits" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Re-Identification" + "@value": "Benefit" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CopyrightViolation", + "@id": "https://w3id.org/dpv/risk/owl#DenialServiceAttack", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -11226,7 +11151,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N73922ea12cd34584b91e209f306167ae" + "@id": "_:N8705162a41ca472c9e3867ec5902de25" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11236,7 +11161,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11248,37 +11176,73 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Copyright Violation" + "@value": "Something that acts as or causes Denial of Service Attack (DoS)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Copyright Violation" + "@value": "Denial of Service Attack (DoS)" } ] }, { - "@id": "_:N73922ea12cd34584b91e209f306167ae", + "@id": "_:N8705162a41ca472c9e3867ec5902de25", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S3L1", + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/owl#RiskConcept" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Risks and issues that arise during operational processes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Operational Security Risk" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L3", + "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -11294,7 +11258,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.33,xsd:decimal" + "@value": "0.43,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11304,7 +11268,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11316,21 +11280,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM3x3 S:3 L:1)" + "@value": "High Risk (RM7x7 S:7 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L7", + "@id": "https://w3id.org/dpv/risk/owl#Cryptojacking", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -11344,9 +11308,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.14,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N3adf839933da482c89a2828fc9743969" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11356,7 +11326,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11368,18 +11341,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low" + "@value": "Something that acts as or causes Cryptojacking" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:1 L:7)" + "@value": "Cryptojacking" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IllegalDataProcessing", + "@id": "_:N3adf839933da482c89a2828fc9743969", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Threat Landscape 2021" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#PsychologicalHarm", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -11404,7 +11393,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N83bd5296b4d94804a73f0e0518c39495" + "@id": "_:N0ddf524630684b719d7f03f907c20cff" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11414,7 +11403,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11426,54 +11415,47 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Illegal Processing of Data" + "@value": "Something that acts as or causes Psychological Harm" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Illegal Data Processing" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0" + "@value": "Psychological Harm" } ] }, { - "@id": "_:N83bd5296b4d94804a73f0e0518c39495", + "@id": "_:N0ddf524630684b719d7f03f907c20cff", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskManagement", + "@id": "https://w3id.org/dpv/risk/owl#hasControl", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-06-12" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "ISO 31073:2022 Risk management vocabulary" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11481,11 +11463,6 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -11495,21 +11472,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk" + "@value": "Indicates the use of specified control" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Management" + "@value": "has control" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentOngoing", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L7", "@type": [ - "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -11520,7 +11502,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.14,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11530,7 +11517,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11542,21 +11529,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident is ongoing i.e. still active" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Ongoing" + "@value": "Low Risk (RM7x7 S:1 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VeryHighRisk", + "@id": "https://w3id.org/dpv/risk/owl#VeryHighLikelihood", "@type": [ + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -11582,10 +11569,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" }, { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11597,13 +11584,13 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Very High" + "@value": "Level where Likelihood is Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk" + "@value": "Very High Likelihood" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ @@ -11614,15 +11601,32 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityIncident", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeModification", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Ncecbd81981b3460f9cede6031d4ab8b1" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11632,7 +11636,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11644,18 +11651,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident where the confidentiality of information or system has been affected" + "@value": "Something that acts as or causes Unauthorised Code Modification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confidentiality Incident" + "@value": "Unauthorised Code Modification" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3", + "@id": "_:Ncecbd81981b3460f9cede6031d4ab8b1", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L5", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -11672,6 +11695,11 @@ "@value": "2022-08-17" } ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.31,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -11679,7 +11707,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11691,18 +11719,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix 3x3" + "@value": "High Risk (RM7x7 S:3 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Compensation", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemModification", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -11710,13 +11738,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -11725,6 +11753,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N029a97b214024c18a899586cb3864d2a" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -11732,7 +11765,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11744,21 +11780,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms" + "@value": "Something that acts as or causes Unauthorised System Modification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compensation" + "@value": "Unauthorised System Modification" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RemoveImpact", + "@id": "_:N029a97b214024c18a899586cb3864d2a", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Injury", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -11769,7 +11821,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Na6c5e17bb8ac4135b62412f66dd88460" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11779,7 +11842,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ImpactControl" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11791,23 +11854,55 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that removes Impact i.e. prevents it from materialising" + "@value": "Something that acts as or causes Injury" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remove Impact" + "@value": "Injury" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ComponentFailure", + "@id": "_:Na6c5e17bb8ac4135b62412f66dd88460", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAssessment", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N99d1d0a8b80740559dacd97d8fb47665" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -11815,7 +11910,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11827,27 +11922,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Component Failure" + "@value": "Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other." } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Component Failure" + "@value": "Risk Matrix" } + ] + }, + { + "@id": "_:N99d1d0a8b80740559dacd97d8fb47665", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of" + "@value": "IEC 31010:2019" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/72140.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#InterceptCommunications", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L3", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -11861,15 +11966,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N9ba04625c759479eba79e0016163e8e6" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11879,52 +11978,30 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Interception of Communications" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Intercept Communications" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N9ba04625c759479eba79e0016163e8e6", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Moderate Risk (RM5x5 S:2 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseTrust", + "@id": "https://w3id.org/dpv/risk/owl#ExposureToHarmfulSpeech", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -11949,7 +12026,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nbb93cef662444084828d04948d35895d" + "@id": "_:N95f46ba999c74717949420ed05a75570" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11959,7 +12036,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11971,54 +12048,59 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Trust" + "@value": "Something that acts as or causes Harmful Speech" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Trust" + "@value": "Exposure to Harmful Speech" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0" } ] }, { - "@id": "_:Nbb93cef662444084828d04948d35895d", + "@id": "_:N95f46ba999c74717949420ed05a75570", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SocialDisadvantage", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S1L3", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.33,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12028,7 +12110,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12040,21 +12122,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Social Disadvantage" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Social Disadvantage" + "@value": "Moderate Risk (RM3x3 S:1 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L3", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemAccess", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -12068,9 +12150,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.24,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6fdf74981d95420a82b9c97acf9aa9eb" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12080,7 +12168,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12092,21 +12186,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" + "@value": "Something that acts as or causes Unauthorised System Access" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:4 L:3)" + "@value": "Unauthorised System Access" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseCustomerConfidence", + "@id": "_:N6fdf74981d95420a82b9c97acf9aa9eb", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#BruteForceAuthorisations", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -12128,7 +12238,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0d138f94265e46f293490fbe0fc8074c" + "@id": "_:Nb75b090fdcda4ec38e841680681bf642" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12138,7 +12248,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12150,34 +12266,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Customer Confidence" + "@value": "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Customer Confidence" + "@value": "Brute Force Authorisations" } ] }, { - "@id": "_:N0d138f94265e46f293490fbe0fc8074c", + "@id": "_:Nb75b090fdcda4ec38e841680681bf642", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S1L1", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L4", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -12196,7 +12312,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.11,xsd:decimal" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12206,7 +12322,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12218,32 +12334,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM3x3 S:1 L:1)" + "@value": "Very Low Risk (RM7x7 S:1 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RightsImpact", + "@id": "https://w3id.org/dpv/risk/owl#RiskSource", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-02-14" } ], "http://purl.org/dc/terms/modified": [ @@ -12252,11 +12362,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N4e0b95db2d414e7588f607d2edf6902e" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -12264,10 +12369,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Impact" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12279,54 +12381,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Impact to Rights" + "@value": "The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Impact to Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ImpactToRights\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N4e0b95db2d414e7588f607d2edf6902e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Risk Source" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataAccess", + "@id": "https://w3id.org/dpv/risk/owl#Reward", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], "http://purl.org/dc/terms/modified": [ @@ -12335,11 +12415,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nc799e152712d4ee48d59c2a1366fca7f" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -12347,7 +12422,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12359,37 +12434,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Access" + "@value": "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Access" - } - ] - }, - { - "@id": "_:Nc799e152712d4ee48d59c2a1366fca7f", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Reward" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#EquipmentMalfunction", + "@id": "https://w3id.org/dpv/risk/owl#DataBreach", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -12411,7 +12470,15 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N7f1dc230141c4448a99f28f362191020" + "@id": "_:N0353966748ad43cc9b9c03081ec6b6f9" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples/owl#E0071" + }, + { + "@id": "https://w3id.org/dpv/examples/owl#E0069" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12421,7 +12488,16 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12433,24 +12509,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Equipment Malfunction" + "@value": "Something that acts as or causes Data Breach" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Equipment Malfunction" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here equipment refers to physical equipment" + "@value": "Data Breach" } ] }, { - "@id": "_:N7f1dc230141c4448a99f28f362191020", + "@id": "_:N0353966748ad43cc9b9c03081ec6b6f9", "@type": [ "https://schema.org/WebPage" ], @@ -12466,16 +12536,21 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RemedyControl", + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatusUnknown", "@type": [ + "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12485,7 +12560,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12497,41 +12572,31 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to remedy consequences of event" + "@value": "The status of a incident is unknown" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remedy Control" + "@value": "Incident Status Unknown" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#exploitsVulnerability", + "@id": "https://w3id.org/dpv/risk/owl#IntentionalMisuse", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" - ], - "http://purl.org/dc/dcam/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Threat" - } - ], - "http://purl.org/dc/dcam/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" - } + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12543,37 +12608,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the threat (subject) exploits the indicated vulnerability (object)" + "@value": "Intentional Misuse" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "exploits vulnerability" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Threat" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@value": "Intentional Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorRisk", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "@id": "https://w3id.org/dpv/risk/owl#IntegrityIncident", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { @@ -12588,7 +12637,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12600,22 +12649,28 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk" + "@value": "Incident where the integrity of information or system has been affected" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Risk" + "@value": "Integrity Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DeliberateIncident", + "@id": "https://w3id.org/dpv/risk/owl#HaltSource", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", @@ -12629,7 +12684,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@id": "https://w3id.org/dpv/risk/owl#SourceControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12641,18 +12696,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident caused due to deliberate actions of a human" + "@value": "Control that halts the risk source or prevents it from materialising" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Deliberate Incident" + "@value": "Halt Source" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S3L2", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L5", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -12671,7 +12726,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.67,xsd:decimal" + "@value": "0.40,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12681,7 +12736,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12693,31 +12748,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM3x3 S:3 L:2)" + "@value": "High Risk (RM5x5 S:2 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#hasControl", + "@id": "https://w3id.org/dpv/risk/owl#HighSeverity", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" + "https://w3id.org/dpv/owl#Severity", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.75,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12725,6 +12786,17 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -12734,37 +12806,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the use of specified control" + "@value": "Level where Severity is High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has control" + "@value": "High Severity" } ], - "https://schema.org/rangeIncludes": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseReputation", + "@id": "https://w3id.org/dpv/risk/owl#Detriment", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-23" } ], "http://purl.org/dc/terms/modified": [ @@ -12773,11 +12846,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N0282f3114f5b4278b632620b9b954c7d" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -12785,7 +12853,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12797,57 +12865,47 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Reputation" + "@value": "Something that acts as or causes Detriment" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Reputation" + "@value": "Detriment" } ] }, { - "@id": "_:N0282f3114f5b4278b632620b9b954c7d", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L7", "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Harshvardhan J. Pandit" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#hasThreatSource", - "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk/owl#Threat" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/risk/owl#ThreatSource" + "@value": "0.29,xsd:decimal" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12859,39 +12917,57 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the threat (subject) has the indicated source (object)" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has threat source" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Threat" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#ThreatSource" + "@value": "Moderate Risk (RM7x7 S:2 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeAccess", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N99568e0cd3774d348d85262f04bc3a0b" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" } ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, { "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } @@ -12905,26 +12981,53 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes an attack on security with the aim of undermining it" + "@value": "Something that acts as or causes Unauthorised Code Access" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Security Attack" + "@value": "Unauthorised Code Access" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentNotice", + "@id": "_:N99568e0cd3774d348d85262f04bc3a0b", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S3L2", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.67,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12934,7 +13037,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Notice" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12946,43 +13049,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Notice associated with an Incident" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Notice" + "@value": "High Risk (RM3x3 S:3 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolenceAgainstChildren", + "@id": "https://w3id.org/dpv/risk/owl#IncidentOngoingReport", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nb34535276ddd4a56ac18dcc8fc489cbb" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12992,7 +13078,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13004,40 +13090,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Child Violence" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Violence against children" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ChildViolence\" in DPV 2.0" - } - ] - }, - { - "@id": "_:Nb34535276ddd4a56ac18dcc8fc489cbb", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@language": "en", + "@value": "Incident Ongoing Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Terrorism", + "@id": "https://w3id.org/dpv/risk/owl#LoseNegotiatingCapacity", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -13062,7 +13126,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nf6a25073f9274363bcb649fe8540fc70" + "@id": "_:Nf8d97cf300cf44d5881be9535d0b1dff" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13072,7 +13136,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13084,18 +13148,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Terrorism" + "@value": "Something that acts as or causes Loss of Negotiating Capacity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Terrorism" + "@value": "Lose of Negotiating Capacity" } ] }, { - "@id": "_:Nf6a25073f9274363bcb649fe8540fc70", + "@id": "_:Nf8d97cf300cf44d5881be9535d0b1dff", "@type": [ "https://schema.org/WebPage" ], @@ -13111,9 +13175,9 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExtremelyHighSeverity", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L4", "@type": [ - "https://w3id.org/dpv/owl#Severity", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -13125,12 +13189,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.99,xsd:decimal" + "@value": "0.41,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13140,7 +13204,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13152,214 +13216,241 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Extremely High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" + "@value": "High Risk (RM7x7 S:5 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L7", + "@id": "https://w3id.org/dpv/risk/owl#", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/ns/dx/prof/Profile", + "http://www.w3.org/2002/07/owl#Ontology" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/bibliographicCitation": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "@value": "http://www.w3.org/2004/02/skos/core" + }, { - "@value": "0.99,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "@id": "http://www.w3.org/2002/07/owl" + }, { - "@id": "https://w3id.org/dpv/risk/owl#" + "@value": "http://www.w3.org/2000/01/rdf-schema" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@value": "Julian Flake" + }, + { + "@value": "Rob Brennan" + }, + { + "@value": "Fajar Ekaputra" + }, + { + "@value": "Harshvardhan J. Pandit" + }, + { + "@value": "Beatriz Esteves" + }, + { + "@value": "Axel Polleres" + }, + { + "@value": "Georg P. Krog" + }, + { + "@value": "Julio Fernandez" + }, + { + "@value": "Delaram Golpayegani" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/created": [ { "@language": "en", - "@value": "accepted" + "@value": "2022-08-14" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/creator": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "@value": "Paul Ryan" + }, { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:7 L:7)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ImpactControl", - "@type": [ - "https://w3id.org/dpv/risk/owl#RiskControl", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ + "@value": "Georg P. Krog" + }, + { + "@language": "en", + "@value": "Delaram Golpayegani" + }, { + "@language": "en", "@value": "Harshvardhan J. Pandit" + }, + { + "@language": "en", + "@value": "Beatriz Esteves" + }, + { + "@language": "en", + "@value": "Rob Brennan" + }, + { + "@language": "en", + "@value": "Julian Flake" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/description": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@language": "en", + "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/hasVersion": [ { "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/identifier": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@value": "https://w3id.org/dpv/risk" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/issued": [ { "@language": "en", - "@value": "accepted" + "@value": "2022-08-14" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/license": [ { - "@language": "en", - "@value": "Risk Mitigation Measure that controls Impacts" + "@id": "https://www.w3.org/copyright/document-license-2023/" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/modified": [ { "@language": "en", - "@value": "Impact Control" + "@value": "2024-07-13" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingPolicy", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/publisher": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://www.w3.org/" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://www.w3.org/groups/cg/dpvcg/" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/title": [ { "@language": "en", - "@value": "accepted" + "@value": "Risk Concepts" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/ontology/bibo/doi": [ { - "@language": "en", - "@value": "Something that acts as or causes violation of policy which can be either internal or external policy" + "@value": "10.5281/zenodo.12505841" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/ontology/bibo/status": [ { - "@language": "en", - "@value": "Violating Policy" + "@value": "http://purl.org/ontology/bibo/status/published" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L5", - "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/vocab/vann/preferredNamespacePrefix": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "risk" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/vocab/vann/preferredNamespaceUri": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#Label": [ { - "@value": "0.40,xsd:decimal" + "@language": "en", + "@value": "RISK" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2002/07/owl#versionIRI": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://w3id.org/dpv/2.1-dev/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2002/07/owl#versionInfo": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@value": "2.1-dev" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/ns/dx/prof/hasResource": [ { - "@language": "en", - "@value": "accepted" + "@id": "https://w3id.org/dpv/examples" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld" + }, + { + "@id": "https://w3id.org/dpv/primer" + }, + { + "@id": "https://w3id.org/dpv/guides" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-html" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/ns/dx/prof/isProfileOf": [ + { + "@id": "http://www.w3.org/2002/07/owl" + }, + { + "@id": "https://w3id.org/dpv/owl" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://xmlns.com/foaf/0.1/logo": [ { - "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" + "@id": "https://w3id.org/dpv/media/logo.png" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/version": [ { - "@language": "en", - "@value": "High Risk (RM5x5 S:2 L:5)" + "@value": "2.1-dev" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RemoveSource", + "@id": "https://w3id.org/dpv/risk/owl#SourceControl", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -13380,7 +13471,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SourceControl" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13392,43 +13483,31 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that removes the risk source" + "@value": "Risk Mitigation Measure that controls the Source" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remove Source" + "@value": "Source Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedAccesstoPremises", + "@id": "https://w3id.org/dpv/risk/owl#hasIncident", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N2b8ae4e96b21406bb91bfdec8f460776" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13436,11 +13515,6 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -13450,37 +13524,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Access to Premises" + "@value": "Indicates an incident is associated with the specified context" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Access to Premises" - } - ] - }, - { - "@id": "_:N2b8ae4e96b21406bb91bfdec8f460776", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "has incident" } ], - "https://schema.org/url": [ + "https://schema.org/rangeIncludes": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DataCorruption", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L7", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -13494,15 +13557,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Ncd7b81f0daef4263a47284ebb48b83f6" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13512,55 +13569,33 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Corruption of Data" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Corruption" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"Corruption Data\" in DPV 2.0" - } - ] - }, - { - "@id": "_:Ncd7b81f0daef4263a47284ebb48b83f6", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Extremely High Risk (RM7x7 S:7 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnwantedDataDeletion", + "@id": "https://w3id.org/dpv/risk/owl#Terrorism", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -13582,7 +13617,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N7ff2bed0d152400e90aff3c52f1320b0" + "@id": "_:N84e706a33b7c462194d2c8fb5c04326c" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13592,7 +13627,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13604,18 +13639,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Data Deletion" + "@value": "Something that acts as or causes Terrorism" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Data Deletion" + "@value": "Terrorism" } ] }, { - "@id": "_:N7ff2bed0d152400e90aff3c52f1320b0", + "@id": "_:N84e706a33b7c462194d2c8fb5c04326c", "@type": [ "https://schema.org/WebPage" ], @@ -13631,38 +13666,16 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L1", + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.08,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -13672,21 +13685,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Risks and issues that affect or have the potential to affect specific individuals" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:4 L:1)" + "@value": "Individual Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L4", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingEthicsCode", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -13700,9 +13713,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.16,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N5971f1bb7e3149b49a4335be11b0926f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13712,107 +13731,52 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low" + "@value": "Something that acts as or causes Violation of Ethics Code" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:2 L:4)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#MonitorVulnerabilities", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Control that monitors a Risk Vulnerability" + "@value": "Violating Ethics Code" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Monitor Vulnerabilities" + "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IndividualHealthSafety", + "@id": "_:N5971f1bb7e3149b49a4335be11b0926f", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "accepted" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Individual Health & Safety" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ConsequenceControl", + "@id": "https://w3id.org/dpv/risk/owl#RemoveConsequence", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskControl", @@ -13836,7 +13800,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#ConsequenceControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13848,21 +13812,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that controls the Consequences" + "@value": "Control that removes Consequence i.e. prevents it from materialising" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Consequence Control" + "@value": "Remove Consequence" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L2", + "@id": "https://w3id.org/dpv/risk/owl#LoseGoodwill", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -13876,9 +13840,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ { - "@value": "0.12,xsd:decimal" + "@id": "_:N194bc10f01ef4bdb99f12487816e6826" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13888,7 +13858,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13900,21 +13870,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Something that acts as or causes Loss of Goodwill" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:3 L:2)" + "@value": "Lose of Goodwill" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L5", + "@id": "_:N194bc10f01ef4bdb99f12487816e6826", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#PersonalSafetyEndangerment", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -13928,9 +13914,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.51,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Na783f8da28594e8794173492db9ecac9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13940,7 +13932,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13952,32 +13944,54 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" + "@value": "Something that acts as or causes Personal Safety Endangerment" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:5 L:5)" + "@value": "Personal Safety Endangerment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels", + "@id": "_:Na783f8da28594e8794173492db9ecac9", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Misuse", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskLevel", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Delaram Golpayegani" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-06-11" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13987,7 +14001,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskLevel" + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13999,21 +14013,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 3 Risk Levels from High to Low" + "@value": "Something that acts as or causes Misuse" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "3 Risk Levels" + "@value": "Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VeryHighSeverity", + "@id": "https://w3id.org/dpv/risk/owl#EquipmentMalfunction", "@type": [ - "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -14024,12 +14038,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.9,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N53bfad5db8324151841ce01472d06f41" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14039,10 +14059,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" }, { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14054,47 +14074,59 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Very High" + "@value": "Something that acts as or causes Equipment Malfunction" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Severity" + "@value": "Equipment Malfunction" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" + "@value": "Here equipment refers to physical equipment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#refersToRisk", + "@id": "_:N53bfad5db8324151841ce01472d06f41", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" + "https://schema.org/WebPage" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/owl#Incident" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "https://schema.org/url": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#VeryLowRisk", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskLevel", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-18" } ], - "http://purl.org/vocab/vann/example": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/examples/owl#E0069" + "@value": "0.1,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14102,6 +14134,14 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -14111,58 +14151,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the incident (subject) is a materialisation of the indicated risk (object)" + "@value": "Level where Risk is Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "refers to risk" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/owl#Incident" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/owl#Risk" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#SocietalHealthSafety", - "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" + "@value": "Very Low Risk" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Societal Health & Safety" + "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#EquipmentFailure", + "@id": "https://w3id.org/dpv/risk/owl#IdentityTheft", "@type": [ "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -14187,7 +14193,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nc281053cb7ff4095b5eef42624c4ff46" + "@id": "_:N33b7660d50a4461e927089957dfd848b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14198,6 +14204,9 @@ "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14209,43 +14218,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Equipment Failure" + "@value": "Something that acts as or causes Identity Theft" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Equipment Failure" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here equipment refers to physical equipment" + "@value": "Identity Theft" } ] }, { - "@id": "_:Nc281053cb7ff4095b5eef42624c4ff46", + "@id": "_:N33b7660d50a4461e927089957dfd848b", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L6", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedAccesstoPremises", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -14259,9 +14262,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.49,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N7487c570f8f54358874e08fa38c8f27d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14271,7 +14280,16 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14283,62 +14301,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" + "@value": "Something that acts as or causes Unauthorised Access to Premises" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:4 L:6)" + "@value": "Unauthorised Access to Premises" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RecoveryControl", + "@id": "_:N7487c570f8f54358874e08fa38c8f27d", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskControl", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "Control to recover from event" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Recovery Control" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels", + "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels", "@type": [ - "https://w3id.org/dpv/owl#Likelihood", + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -14360,7 +14352,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Likelihood" + "@id": "https://w3id.org/dpv/owl#Severity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14372,21 +14364,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 3 Likelihood Levels from High to Low" + "@value": "Scale with 3 Severity Levels from High to Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "3 Likelihood Levels" + "@value": "3 Severity Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExtremelyLowSeverity", + "@id": "https://w3id.org/dpv/risk/owl#UnwantedDisclosureData", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -14397,12 +14389,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.01,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nf14815c8a8694940bcdb35d12bf37b11" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14412,7 +14410,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14424,24 +14425,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Extremely Low" + "@value": "Something that acts as or causes Unwanted Disclosure of Data" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Severity" + "@value": "Unwanted Disclosure of Data" } + ] + }, + { + "@id": "_:Nf14815c8a8694940bcdb35d12bf37b11", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ChangeImpact", + "@id": "https://w3id.org/dpv/risk/owl#ChangeConsequence", "@type": [ "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -14465,7 +14476,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ImpactControl" + "@id": "https://w3id.org/dpv/risk/owl#ConsequenceControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14477,21 +14488,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that changes Impact" + "@value": "Control that changes Consequence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Change Impact" + "@value": "Change Consequence" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#HaltSource", + "@id": "https://w3id.org/dpv/risk/owl#ExtremelyLowRisk", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -14502,7 +14513,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.01,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14512,7 +14528,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SourceControl" + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14524,37 +14540,42 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that halts the risk source or prevents it from materialising" + "@value": "Level where Risk is Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Halt Source" + "@value": "Extremely Low Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L4", + "@id": "https://w3id.org/dpv/risk/owl#hasThreatSource", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#Threat" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv/risk/owl#ThreatSource" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/created": [ { - "@value": "0.24,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14562,11 +14583,6 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -14576,21 +14592,31 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Indicates the threat (subject) has the indicated source (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:3 L:4)" + "@value": "has threat source" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Threat" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#ThreatSource" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L3", + "@id": "https://w3id.org/dpv/risk/owl#Extorsion", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -14604,9 +14630,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.06,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N78e6085a5a4a4a08adbcdb4af46722d9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14616,7 +14648,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14628,27 +14663,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low" + "@value": "Something that acts as or causes Extorsion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:1 L:3)" + "@value": "Extorsion" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SourceControl", + "@id": "_:N78e6085a5a4a4a08adbcdb4af46722d9", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", - "http://www.w3.org/2002/07/owl#Class" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ENISA Threat Taxonomy 2016" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IncidentMitigationMeasure", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { @@ -14663,7 +14708,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/owl#RiskMitigationMeasure" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14675,20 +14720,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that controls the Source" + "@value": "A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Source Control" + "@value": "Incident Mitigation Measure" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L5", + "@id": "https://w3id.org/dpv/risk/owl#ExtremelyLowSeverity", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -14700,12 +14745,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.80,xsd:decimal" + "@value": "0.01,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14715,7 +14760,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14727,21 +14772,58 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High" + "@value": "Level where Severity is Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:4 L:5)" + "@value": "Extremely Low Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L1", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - RDF/XML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.rdf" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedInformationDisclosure", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -14755,9 +14837,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.12,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N89971235b5e34930a94f46c696e0ac94" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14767,7 +14855,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14779,21 +14870,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Something that acts as or causes Unauthorised Information Disclosure" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Unauthorised Information Disclosure" + } + ] + }, + { + "@id": "_:N89971235b5e34930a94f46c696e0ac94", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Very Low Risk (RM5x5 S:3 L:1)" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#HighSeverity", + "@id": "https://w3id.org/dpv/risk/owl#Reidentification", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Severity", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -14804,12 +14911,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.75,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14819,13 +14927,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" }, { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14837,27 +14942,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is High" + "@value": "Something that acts as or causes Re-identification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Severity" + "@value": "Re-identification" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" + "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatusUnknown", + "@id": "https://w3id.org/dpv/risk/owl#IncidentImpactAssessment", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -14868,7 +14972,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14878,7 +14982,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + "@id": "https://w3id.org/dpv/owl#ImpactAssessment" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14890,18 +14994,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The status of a incident is unknown" + "@value": "An impact assessment associated with a incident" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Status Unknown" + "@value": "Incident Impact Assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingStatutoryObligations", + "@id": "https://w3id.org/dpv/risk/owl#RightsImpact", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -14926,7 +15030,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb5000792f7ae42ffb4c7efe3b93be7df" + "@id": "_:N7b552ef83c274f84b167cc68c23676bb" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14936,36 +15040,39 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/owl#Impact" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Statutory Obligations" + "@value": "Something that acts as or causes Impact to Rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Statutory Obligations" + "@value": "Impact to Rights" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0" + "@value": "This concept was called \"ImpactToRights\" in DPV 2.0" } ] }, { - "@id": "_:Nb5000792f7ae42ffb4c7efe3b93be7df", + "@id": "_:N7b552ef83c274f84b167cc68c23676bb", "@type": [ "https://schema.org/WebPage" ], @@ -14981,26 +15088,27 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L3", + "@id": "https://w3id.org/dpv/risk/owl#Renumeration", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.36,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15010,7 +15118,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15022,26 +15130,43 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Something that acts as or provides renumeration which is in monetary or financial form" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:3 L:3)" + "@value": "Remuneration" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityIncident", + "@id": "https://w3id.org/dpv/risk/owl#FinancialLoss", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N698d6b9272804e2dba685b14f6e69152" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15051,7 +15176,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15063,57 +15188,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident where the availability of information or system has been affected" + "@value": "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Availability Incident" + "@value": "Financial Loss" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact", + "@id": "_:N698d6b9272804e2dba685b14f6e69152", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/owl#RiskConcept" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "Things that cause or have the potential to impact financial resources" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Financial Impact" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VeryHighLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#AvoidSource", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -15124,12 +15229,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.9,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15139,10 +15239,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#SourceControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15154,27 +15251,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Very High" + "@value": "Control that avoids the risk source" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" + "@value": "Avoid Source" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Harm", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L3", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -15185,13 +15276,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-13" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.31,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15201,7 +15291,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15213,44 +15303,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Harm to humans" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Harm" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept refers to the general abstract notion of harm" + "@value": "Moderate Risk (RM7x7 S:5 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Renumeration", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S3L3", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15260,7 +15343,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15272,73 +15355,52 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides renumeration which is in monetary or financial form" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remuneration" + "@value": "High Risk (RM3x3 S:3 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L2", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.16,xsd:decimal" - } + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://www.w3.org/TR/turtle/" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://www.iana.org/assignments/media-types/text/turtle" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "accepted" + "@value": "Risk Concepts - Turtle serialiation" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low" + "@id": "https://w3id.org/dpv/risk/risk-owl.ttl" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "Low Risk (RM7x7 S:4 L:2)" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MalwareAttack", + "@id": "https://w3id.org/dpv/risk/owl#ModerateSeverity", "@type": [ + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -15349,18 +15411,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N933b42794d4f41a39ee17bc9b20bf774" + "@value": "0.5,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15370,7 +15426,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15382,37 +15444,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Malware Attack" + "@value": "Level where Severity is Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Malware Attack" - } - ] - }, - { - "@id": "_:N933b42794d4f41a39ee17bc9b20bf774", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "Moderate Severity" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L7", + "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels", "@type": [ + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -15423,12 +15475,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.57,xsd:decimal" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15438,7 +15485,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/owl#RiskLevel" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15450,34 +15497,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High" + "@value": "Scale with 3 Risk Levels from High to Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:4 L:7)" + "@value": "3 Risk Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ReduceSeverity", + "@id": "https://w3id.org/dpv/risk/owl#SocietalHealthSafety", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -15485,7 +15521,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReductionControl" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15494,21 +15530,15 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Control that reduces the severity of an event" - } - ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reduce Severity" + "@value": "Societal Health & Safety" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DetectionControl", + "@id": "https://w3id.org/dpv/risk/owl#RecoveryControl", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskControl", @@ -15539,45 +15569,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to detect event" + "@value": "Control to recover from event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Detection Control" + "@value": "Recovery Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MaliciousCodeAttack", + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N7beef942706b41468112e467b91c5f39" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -15585,7 +15593,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15597,59 +15605,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Malicious Code Attack" + "@value": "Things that cause or have the potential to impact financial resources" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Malicious Code Attack" + "@value": "Financial Impact" } ] }, { - "@id": "_:N7beef942706b41468112e467b91c5f39", + "@id": "https://w3id.org/dpv/risk/owl#hasRiskSource", "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "https://schema.org/url": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@id": "https://w3id.org/dpv/owl#Risk" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataDisclosure", - "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#RiskSource" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nf415d60c8c8849ba95e5611d481b06ce" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15657,11 +15642,6 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -15671,55 +15651,95 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Disclosure" + "@value": "Indicates the risk (subject) has the indicated risk source (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Disclosure" + "@value": "has risk source" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/owl#Risk" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskSource" } ] }, { - "@id": "_:Nf415d60c8c8849ba95e5611d481b06ce", + "@id": "https://w3id.org/dpv/guides", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://www.w3.org/TR/html/" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/format": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Guides for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/guides" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L2", + "@id": "https://w3id.org/dpv/primer", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://www.w3.org/TR/html/" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/format": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/title": [ { - "@value": "0.24,xsd:decimal" + "@value": "Primer for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/primer" } ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ComponentFailure", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -15727,7 +15747,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15739,38 +15762,28 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate" + "@value": "Something that acts as or causes Component Failure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:6 L:2)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L6", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "Component Failure" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "0.61,xsd:decimal" + "@language": "en", + "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -15779,7 +15792,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15791,20 +15804,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High" + "@value": "Risks and issues that affect or have the potential to affect society at large or specific groups in society" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:5 L:6)" + "@value": "Societal Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S1L3", + "@id": "https://w3id.org/dpv/risk/owl#HighRisk", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -15816,12 +15829,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.33,xsd:decimal" + "@value": "0.75,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15831,7 +15844,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15843,43 +15862,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" + "@value": "Level where Risk is High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM3x3 S:1 L:3)" + "@value": "High Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#HumanErrors", + "@id": "https://w3id.org/dpv/risk/owl#EnvironmentalIncident", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N7d9296887d1d4b6ea986d2ad6579a1ec" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15889,7 +15897,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15901,37 +15909,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Human Errors" + "@value": "Incident caused due to environmental factors outside human controls" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Human Errors" - } - ] - }, - { - "@id": "_:N7d9296887d1d4b6ea986d2ad6579a1ec", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Environmental Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L4", + "@id": "https://w3id.org/dpv/risk/owl#MonitorRiskSource", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -15942,12 +15934,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.32,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15957,7 +15944,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15969,37 +15956,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" + "@value": "Control that monitors a Risk Source" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:2 L:4)" + "@value": "Monitor Risk Source" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L5", + "@id": "https://w3id.org/dpv/risk/owl#Threat", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.99,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16009,7 +15985,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskSource" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16021,20 +15997,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High" + "@value": "Risk source event which causes Risk" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:5 L:5)" + "@value": "Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl", + "@id": "https://w3id.org/dpv/risk/owl#IdentificationControl", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ @@ -16043,11 +16020,6 @@ "@value": "2024-05-19" } ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples/owl#E0071" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -16055,7 +16027,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskMitigationMeasure" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16067,21 +16039,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that modifies risk" + "@value": "Control to identify characteristics of event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Control" + "@value": "Identification Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S1L2", + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16095,11 +16067,6 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.22,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -16107,7 +16074,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16119,21 +16086,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low" + "@value": "A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM3x3 S:1 L:2)" + "@value": "Risk Matrix 3x3" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L3", + "@id": "https://w3id.org/dpv/risk/owl#IncidentRegister", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16144,12 +16110,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.31,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16159,7 +16120,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/owl#RecordsOfActivities" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16171,21 +16132,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + "@value": "A register recording incidentes, their reports, notifications, and other related activities" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:5 L:3)" + "@value": "Incident Register" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L7", + "@id": "https://w3id.org/dpv/risk/owl#UnwantedCodeDeletion", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16199,9 +16160,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.29,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N9b03e23aa8864f4288a1885778e3b1e4" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16211,7 +16178,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16223,18 +16196,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate" + "@value": "Something that acts as or causes Unwanted Code Deletion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:2 L:7)" + "@value": "Unwanted Code Deletion" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccountCredentials", + "@id": "_:N9b03e23aa8864f4288a1885778e3b1e4", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#CopyrightViolation", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -16259,7 +16248,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nf877665a169e4a7eac29964fc15db245" + "@id": "_:N3984b17b1694455793b94c3ad850178d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16269,7 +16258,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16281,18 +16270,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Account Credentials to be compromised" + "@value": "Something that acts as or causes Copyright Violation" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account Credentials" + "@value": "Copyright Violation" } ] }, { - "@id": "_:Nf877665a169e4a7eac29964fc15db245", + "@id": "_:N3984b17b1694455793b94c3ad850178d", "@type": [ "https://schema.org/WebPage" ], @@ -16308,10 +16297,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentTerminated", + "@id": "https://w3id.org/dpv/risk/owl#Scam", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#IncidentStatus", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16322,44 +16311,19 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" + "@value": "2022-08-17" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "Incident Terminated" + "@id": "_:Nea270aca30b44f5a8cfda049ee8bf631" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -16368,7 +16332,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16380,21 +16347,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that affect or have the potential to affect society at large or specific groups in society" + "@value": "Something that acts as or causes Scam" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Societal Risk" + "@value": "Scam" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L1", + "@id": "_:Nea270aca30b44f5a8cfda049ee8bf631", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#PhysicalAssault", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16408,9 +16391,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.12,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6b8cf1ee50ba4ea081a101b53baf3bb3" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16420,7 +16409,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16432,21 +16421,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low" + "@value": "Something that acts as or causes Physical Assault" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:6 L:1)" + "@value": "Physical Assault" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnwantedCodeDeletion", + "@id": "_:N6b8cf1ee50ba4ea081a101b53baf3bb3", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#PublicOrderBreach", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16468,7 +16473,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nef681cfae64c43969ff8ef7fdde7753a" + "@id": "_:N1d102af8ecd94ce3a875a9a2a7e78bcc" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16478,7 +16483,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16490,37 +16495,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Code Deletion" + "@value": "Something that acts as or causes Public Order Breach" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Code Deletion" + "@value": "Public Order Breach" } ] }, { - "@id": "_:Nef681cfae64c43969ff8ef7fdde7753a", + "@id": "_:N1d102af8ecd94ce3a875a9a2a7e78bcc", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeAccess", + "@id": "https://w3id.org/dpv/risk/owl#RiskAnalysis", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16531,18 +16535,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-18" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N8193907d23bd43dc8b146573989b8a0d" + "@id": "_:N943b082c5ba64ab4896c25d1bccf20cd" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16552,7 +16550,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16564,42 +16562,48 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Access" + "@value": "A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Access" + "@value": "Risk Analysis" } ] }, { - "@id": "_:N8193907d23bd43dc8b146573989b8a0d", + "@id": "_:N943b082c5ba64ab4896c25d1bccf20cd", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "IEC 31010:2019" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.iso.org/standard/72140.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport", + "@id": "https://w3id.org/dpv/risk/owl#IncidentConcluded", "@type": [ + "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16609,7 +16613,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RecordsOfActivities" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16621,21 +16625,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Documented information about an incident, its handling, assessments,and notifications" + "@value": "The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Report" + "@value": "Incident Concluded" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExposureToHarmfulSpeech", + "@id": "https://w3id.org/dpv/risk/owl#ReduceSeverity", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16646,18 +16650,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Ne595b225e5ee4cc2b2374256ef05fa2e" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16667,7 +16660,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ReductionControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16679,48 +16672,89 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Harmful Speech" + "@value": "Control that reduces the severity of an event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Exposure to Harmful Speech" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0" + "@value": "Reduce Severity" } ] }, { - "@id": "_:Ne595b225e5ee4cc2b2374256ef05fa2e", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L5", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.60,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Very High Risk (RM5x5 S:3 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#EnvironmentalIncident", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L3", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.37,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16730,7 +16764,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16742,21 +16776,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident caused due to environmental factors outside human controls" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Environmental Incident" + "@value": "High Risk (RM7x7 S:6 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseGoodwill", + "@id": "https://w3id.org/dpv/risk/owl#IncidentTerminated", "@type": [ + "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16767,18 +16801,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N4f8237833a8141b2bb3c31cf5176bf42" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16788,7 +16811,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16800,36 +16823,62 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Goodwill" + "@value": "The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Goodwill" + "@value": "Incident Terminated" } ] }, { - "@id": "_:N4f8237833a8141b2bb3c31cf5176bf42", + "@id": "https://w3id.org/dpv/risk/owl#DetectionControl", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/created": [ { - "@value": "ISO/IEC 27005:2018" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Control to detect event" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "Detection Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExtremelyHighRisk", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L3", "@type": [ - "https://w3id.org/dpv/owl#RiskLevel", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -16841,12 +16890,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.99,xsd:decimal" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16856,7 +16905,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16868,29 +16917,28 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Extremely High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" + "@value": "Moderate Risk (RM7x7 S:4 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityBreach", + "@id": "https://w3id.org/dpv/risk/owl#IncidentIdentifier", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -16898,7 +16946,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#DataBreach" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16906,18 +16954,41 @@ "@language": "en", "@value": "accepted" } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Identifier associated with an incident" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Incident Identifier" + } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentPreliminaryReport", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L6", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16927,7 +16998,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16939,18 +17010,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Preliminary Report" + "@value": "Moderate Risk (RM7x7 S:2 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataModification", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -16964,7 +17035,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -16973,6 +17044,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nb76ee4ad00614561b02ea8b1fd3da77c" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -16980,7 +17056,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16992,27 +17071,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Non-Material Damage" + "@value": "Something that acts as or causes Unauthorised Data Modification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Non-Material Damage" + "@value": "Unauthorised Data Modification" } + ] + }, + { + "@id": "_:Nb76ee4ad00614561b02ea8b1fd3da77c", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L4", + "@id": "https://w3id.org/dpv/risk/owl#ConsequenceControl", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -17023,12 +17112,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.48,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17038,7 +17122,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17050,23 +17134,28 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + "@value": "Risk Mitigation Measure that controls the Consequences" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:3 L:4)" + "@value": "Consequence Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#EnvironmentalRisk", + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -17074,7 +17163,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/owl#RecordsOfActivities" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17086,21 +17175,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that have their origin in environment or can affect the environment at large" + "@value": "Documented information about an incident, its handling, assessments,and notifications" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Environmental Risk" + "@value": "Incident Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L4", + "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -17111,12 +17200,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-30" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.08,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17126,7 +17216,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17138,22 +17228,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low" + "@value": "Something that acts as or causes Non-Material Damage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:1 L:4)" + "@value": "Non-Material Damage" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability", + "@id": "https://w3id.org/dpv/risk/owl#IncidentNearMiss", "@type": [ + "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", @@ -17167,7 +17269,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17179,18 +17281,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk" + "@value": "The state where an incident was almost successful in taking place i.e. \"it came very close\"" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Vulnerability" + "@value": "Incident Near Miss" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L2", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L7", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -17209,7 +17311,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.24,xsd:decimal" + "@value": "0.71,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17219,7 +17321,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17231,26 +17333,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:3 L:2)" + "@value": "Extremely High Risk (RM7x7 S:5 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentIdentifier", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L4", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.49,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17260,7 +17373,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17272,18 +17385,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Identifier associated with an incident" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Identifier" + "@value": "Very High Risk (RM7x7 S:6 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L1", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L2", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -17302,7 +17415,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.08,xsd:decimal" + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17312,7 +17425,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17324,38 +17437,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:2 L:1)" + "@value": "Low Risk (RM7x7 S:5 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Misuse", + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Delaram Golpayegani" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-06-11" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-17" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17365,7 +17472,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17377,28 +17484,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Misuse" + "@value": "A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Misuse" + "@value": "Risk Matrix 7x7" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AccidentalIncident", + "@id": "https://w3id.org/dpv/risk/owl#UserRisks", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -17406,7 +17508,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17418,18 +17520,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident caused due to accidental actions arising from human or human-controlled situations" + "@value": "Concepts associated with risks that arise due to User or Human use" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Accidental Incident" + "@value": "User Risks" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L7", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L4", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -17448,7 +17550,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.86,xsd:decimal" + "@value": "0.80,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17458,7 +17560,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17470,13 +17572,13 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:6 L:7)" + "@value": "Very High Risk (RM5x5 S:5 L:4)" } ] } diff --git a/2.1-dev/risk/risk-owl.n3 b/2.1-dev/risk/risk-owl.n3 index f2342f89c..b6e848bba 100644 --- a/2.1-dev/risk/risk-owl.n3 +++ b/2.1-dev/risk/risk-owl.n3 @@ -143,7 +143,9 @@ risk-owl:AuthorisationFailure a rdfs:Class, schema:name "ENISa Trust Services Security Incidents 2021" ; schema:url "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Authorisation Failure"@en ; skos:prefLabel "Authorisation Failure"@en . @@ -152,7 +154,8 @@ risk-owl:AvailabilityBreach a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:DataBreach ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:DataBreach ; sw:term_status "accepted"@en . risk-owl:AvailabilityIncident a rdfs:Class, @@ -197,7 +200,8 @@ risk-owl:Blackmail a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Blackmail"@en ; skos:prefLabel "Blackmail"@en . @@ -212,7 +216,9 @@ risk-owl:BruteForceAuthorisations a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; skos:prefLabel "Brute Force Authorisations"@en . @@ -249,7 +255,8 @@ risk-owl:Coercion a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Coercion"@en ; skos:prefLabel "Coercion"@en . @@ -270,7 +277,8 @@ risk-owl:ComponentFailure a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Component Failure"@en ; skos:prefLabel "Component Failure"@en ; @@ -280,7 +288,8 @@ risk-owl:ComponentMalfunction a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Component Malfunction"@en ; skos:prefLabel "Component Malfunction"@en ; @@ -296,7 +305,10 @@ risk-owl:CompromiseAccount a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ; skos:prefLabel "Compromise Account"@en . @@ -311,7 +323,8 @@ risk-owl:CompromiseAccountCredentials a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ; skos:prefLabel "Compromise Account Credentials"@en . @@ -326,7 +339,8 @@ risk-owl:ConfidentialityBreach a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:DataBreach ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:DataBreach ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Confidentiality Breach"@en ; skos:prefLabel "Confidentiality Breach"@en . @@ -395,7 +409,8 @@ risk-owl:Cryptojacking a rdfs:Class, schema:name "ENISA Threat Landscape 2021" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Cryptojacking"@en ; skos:prefLabel "Cryptojacking"@en . @@ -424,7 +439,10 @@ risk-owl:DataBreach a rdfs:Class, vann:example dex-owl:E0069, dex-owl:E0071 ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SecurityBreach ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:SecurityBreach ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Data Breach"@en ; skos:prefLabel "Data Breach"@en . @@ -439,7 +457,8 @@ risk-owl:DataCorruption a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:IntegrityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Corruption of Data"@en ; skos:prefLabel "Data Corruption"@en ; @@ -461,13 +480,11 @@ risk-owl:DenialServiceAttack a rdfs:Class, dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ], - [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ; skos:prefLabel "Denial of Service Attack (DoS)"@en . @@ -516,7 +533,8 @@ risk-owl:DistributedDenialServiceAttack a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ; skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en . @@ -549,7 +567,8 @@ risk-owl:EquipmentFailure a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Equipment Failure"@en ; skos:prefLabel "Equipment Failure"@en ; @@ -565,7 +584,8 @@ risk-owl:EquipmentMalfunction a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Equipment Malfunction"@en ; skos:prefLabel "Equipment Malfunction"@en ; @@ -621,7 +641,8 @@ risk-owl:Extorsion a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Extorsion"@en ; skos:prefLabel "Extorsion"@en . @@ -751,7 +772,8 @@ risk-owl:Fraud a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Fraud"@en ; skos:prefLabel "Fraud"@en . @@ -860,7 +882,8 @@ risk-owl:IdentityFraud a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Identity Fraud"@en ; skos:prefLabel "Identity Fraud"@en . @@ -875,7 +898,8 @@ risk-owl:IdentityTheft a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Identity Theft"@en ; skos:prefLabel "Identity Theft"@en . @@ -1175,7 +1199,8 @@ risk-owl:IntegrityBreach a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:DataBreach ; + rdfs:subClassOf risk-owl:DataBreach, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en . risk-owl:IntegrityIncident a rdfs:Class, @@ -1206,21 +1231,13 @@ risk-owl:InterceptCommunications a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Interception of Communications"@en ; skos:prefLabel "Intercept Communications"@en ; skos:scopeNote "This concept was called \"InterceptionCommunications\" in DPV 2.0"@en . -risk-owl:InternalSecurityThreat a rdfs:Class, - owl:Class, - dpv-owl:RiskConcept ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:RiskConcept ; - sw:term_status "accepted"@en ; - skos:definition "Concepts associated with security threats and issues that originate within the organisation"@en ; - skos:prefLabel "Internal Security Threat"@en . - risk-owl:JudicialCosts a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; @@ -1408,7 +1425,10 @@ risk-owl:MaliciousCodeAttack a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Malicious Code Attack"@en ; skos:prefLabel "Malicious Code Attack"@en . @@ -1423,7 +1443,10 @@ risk-owl:MalwareAttack a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Malware Attack"@en ; skos:prefLabel "Malware Attack"@en . @@ -1635,7 +1658,8 @@ risk-owl:PhishingScam a rdfs:Class, schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Phishing Scam"@en ; skos:prefLabel "Phishing Scam"@en . @@ -2746,7 +2770,8 @@ risk-owl:Reidentification a rdfs:Class, dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Re-identification"@en ; skos:prefLabel "Re-identification"@en ; @@ -2994,7 +3019,9 @@ risk-owl:Sabotage a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Sabotage"@en ; skos:prefLabel "Sabotage"@en . @@ -3009,7 +3036,8 @@ risk-owl:Scam a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Scam"@en ; skos:prefLabel "Scam"@en . @@ -3018,7 +3046,10 @@ risk-owl:SecurityAttack a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ; skos:prefLabel "Security Attack"@en . @@ -3033,7 +3064,10 @@ risk-owl:SecurityBreach a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Security Breach"@en ; skos:prefLabel "Security Breach"@en . @@ -3117,7 +3151,9 @@ risk-owl:Spoofing a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat, + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept, risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Spoofing"@en ; @@ -3133,7 +3169,8 @@ risk-owl:SystemFailure a rdfs:Class, schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes System Failure"@en ; skos:prefLabel "System Failure"@en ; @@ -3149,7 +3186,10 @@ risk-owl:SystemIntrusion a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes System Intrusion"@en ; skos:prefLabel "System Intrusion"@en . @@ -3164,7 +3204,8 @@ risk-owl:SystemMalfunction a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes System Malfunction"@en ; skos:prefLabel "System Malfunction"@en ; @@ -3213,7 +3254,10 @@ risk-owl:UnauthorisedAccesstoPremises a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ; skos:prefLabel "Unauthorised Access to Premises"@en . @@ -3222,7 +3266,10 @@ risk-owl:UnauthorisedActivity a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Activity"@en ; skos:prefLabel "Unauthorised Activity"@en . @@ -3237,7 +3284,9 @@ risk-owl:UnauthorisedCodeAccess a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Code Access"@en ; skos:prefLabel "Unauthorised Code Access"@en . @@ -3252,7 +3301,8 @@ risk-owl:UnauthorisedCodeDisclosure a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ; skos:prefLabel "Unauthorised Code Disclosure"@en . @@ -3267,7 +3317,8 @@ risk-owl:UnauthorisedCodeModification a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ; skos:prefLabel "Unauthorised Code Modification"@en . @@ -3282,7 +3333,8 @@ risk-owl:UnauthorisedDataAccess a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Data Access"@en ; skos:prefLabel "Unauthorised Data Access"@en . @@ -3297,7 +3349,8 @@ risk-owl:UnauthorisedDataDisclosure a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ; skos:prefLabel "Unauthorised Data Disclosure"@en . @@ -3312,7 +3365,8 @@ risk-owl:UnauthorisedDataModification a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ; skos:prefLabel "Unauthorised Data Modification"@en . @@ -3327,7 +3381,8 @@ risk-owl:UnauthorisedInformationDisclosure a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ; skos:prefLabel "Unauthorised Information Disclosure"@en . @@ -3339,7 +3394,8 @@ risk-owl:UnauthorisedReidentification a rdfs:Class, dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ; skos:prefLabel "Unauthorised Re-Identification"@en . @@ -3354,7 +3410,8 @@ risk-owl:UnauthorisedResourceUse a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ; skos:prefLabel "Unauthorised Resource Use"@en . @@ -3369,7 +3426,9 @@ risk-owl:UnauthorisedSystemAccess a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised System Access"@en ; skos:prefLabel "Unauthorised System Access"@en . @@ -3384,7 +3443,8 @@ risk-owl:UnauthorisedSystemModification a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised System Modification"@en ; skos:prefLabel "Unauthorised System Modification"@en . @@ -3399,7 +3459,9 @@ risk-owl:UnwantedCodeDeletion a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ; skos:prefLabel "Unwanted Code Deletion"@en . @@ -3414,7 +3476,9 @@ risk-owl:UnwantedDataDeletion a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ; skos:prefLabel "Unwanted Data Deletion"@en . @@ -3429,7 +3493,8 @@ risk-owl:UnwantedDisclosureData a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ; skos:prefLabel "Unwanted Disclosure of Data"@en . @@ -3641,21 +3706,6 @@ risk-owl:Vulnerability a rdfs:Class, skos:definition "Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk"@en ; skos:prefLabel "Vulnerability"@en . -risk-owl:VulnerabilityCreated a rdfs:Class, - owl:Class, - dpv-owl:RiskConcept ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:modified "2024-08-16"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:InternalSecurityThreat ; - sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Vulnerability Created"@en ; - skos:prefLabel "Vulnerability Created"@en . - risk-owl:causedByThreat a rdf:Property, owl:ObjectProperty ; dcam:rangeIncludes risk-owl:Threat ; diff --git a/2.1-dev/risk/risk-owl.rdf b/2.1-dev/risk/risk-owl.rdf index f2370943c..021836291 100644 --- a/2.1-dev/risk/risk-owl.rdf +++ b/2.1-dev/risk/risk-owl.rdf @@ -13,4415 +13,4457 @@ xmlns:sw="http://www.w3.org/2003/06/sw-vocab-status/ns#" xmlns:vann="http://purl.org/vocab/vann/" > - - Very High Risk - Level where Risk is Very High - The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 - - 0.9,xsd:decimal + + 0.67,xsd:decimal - + - Harshvardhan J. Pandit + 2022-08-17 + High Risk (RM3x3 S:2 L:3) accepted - 2022-08-18 - - - - - - - + Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - Reduction Control - accepted - 2024-05-19 - Control that reduces the likelihood or severity of an event - + Harshvardhan J. Pandit + - + + 2024-08-16 + Exposure to Harmful Speech 2022-08-17 + accepted - 2024-08-16 - Something that acts as or causes Loss of Negotiating Capacity - - Harshvardhan J. Pandit + This concept was called "HarmfulSpeech" in DPV 2.0 - Lose of Negotiating Capacity - + Harshvardhan J. Pandit + Something that acts as or causes Harmful Speech + - + + + Harshvardhan J. Pandit + - - Georg P. Krog, Harshvardhan J. Pandit - Something that acts as or provides compensation - which can be monetary and financial or in other forms - 2024-08-16 - Compensation - - 2024-04-14 + Risk Mitigation Measure that controls the Consequences + Consequence Control + 2024-05-19 accepted - + - - + + 0.24,xsd:decimal + accepted + - Harshvardhan J. Pandit - accepted - Risk Matrix 7x7 + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate + Moderate Risk (RM7x7 S:6 L:2) + Harshvardhan J. Pandit 2022-08-17 - A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types - - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 - + - + Harshvardhan J. Pandit - - - 2024-02-14 - The status of a incident is unknown - accepted - Incident Status Unknown - - - - Violation of Rights - - Something that acts as or causes Violation of Rights - - accepted - Georg P. Krog, Harshvardhan J. Pandit - 2022-08-18 2024-08-16 - This concept was called "ViolationOfRights" in DPV 2.0 - + 2022-08-17 + + Something that acts as or causes Physical Assault + accepted + Physical Assault + - - 0.5,xsd:decimal - - - + + 0.16,xsd:decimal + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low Harshvardhan J. Pandit - accepted - Moderate Severity - Level where Severity is Moderate - 2022-08-18 - The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 - - - - - - Very High Risk (RM7x7 S:6 L:4) - - Harshvardhan J. Pandit - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High - 0.49,xsd:decimal 2022-08-17 accepted - + Low Risk (RM5x5 S:1 L:4) + - - - Indicates the associated context (subject) is caused by the indicated vulnerability (object) - 2024-02-14 + + + + + refers to risk - + accepted - caused by vulnerability - + 2024-02-14 + Indicates the incident (subject) is a materialisation of the indicated risk (object) + + - - Harshvardhan J. Pandit + + Extremely Low Likelihood accepted - 2024-05-19 - Control that reduces the likelihood of an event + 0.01,xsd:decimal + Level where Likelihood is Extremely Low + - - Reduce Likelihood + The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 - + Harshvardhan J. Pandit + 2022-08-18 + - + + 2024-08-16 + Lose of Negotiating Capacity + + + + 2022-08-17 + accepted + Something that acts as or causes Loss of Negotiating Capacity Harshvardhan J. Pandit + + + + + 2024-08-16 - + + Re-identification + Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification accepted - The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 - High Severity - 2022-08-18 - 0.75,xsd:decimal - Level where Severity is High - - - - - - 3 Severity Levels + 2022-08-19 + Harshvardhan J. Pandit - 2022-08-18 - + Something that acts as or causes Re-identification + + + + + 2024-05-19 - Scale with 3 Severity Levels from High to Low - + + Incident Notice accepted - - - + Notice associated with an Incident - Very Low Risk (RM7x7 S:6 L:1) - 0.12,xsd:decimal - accepted + + + High Risk (RM7x7 S:4 L:5) + Harshvardhan J. Pandit + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High + 0.41,xsd:decimal 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low + accepted - - accepted + - + 2022-08-17 - - Something that acts as or causes Unauthorised Code Modification - 2024-08-16 - Unauthorised Code Modification + 0.22,xsd:decimal + accepted Harshvardhan J. Pandit - + Low Risk (RM3x3 S:2 L:1) + Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low + - - Illegal Data Processing - 2024-08-16 - Something that acts as or causes Illegal Processing of Data - This concept was called "IllegalProcessingData" in DPV 2.0 - Harshvardhan J. Pandit + + Risks and issues that affect the reputation of the organisation + + + accepted + Reputational Risk + + + + Something that acts as or causes Unauthorised Data Disclosure + 2024-08-16 - + accepted + Harshvardhan J. Pandit + Unauthorised Data Disclosure 2022-08-17 - + + + + - - Risk Mitigation Measure that controls Impacts - + + + Here equipment refers to physical equipment - Impact Control Harshvardhan J. Pandit + Something that acts as or causes Equipment Failure + 2024-08-16 + 2022-08-17 + Equipment Failure accepted - 2024-05-19 - - - - https://www.iso.org/standard/72140.html - IEC 31010:2019 - + + + - + + Harshvardhan J. Pandit + 2022-08-18 + Level where Severity is Very Low + Very Low Severity + - - Remedy Control - Control to remedy consequences of event + The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 accepted - 2024-05-19 - - - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 + 0.1,xsd:decimal + + - - Something that acts as or causes System Malfunction - 2024-08-16 - Here system refers to both hardware and software systems - Harshvardhan J. Pandit - accepted + + Unauthorised Re-Identification - + Georg P. Krog + 2022-08-19 - 2022-08-17 - System Malfunction - + 2024-08-16 + Something that acts as or causes Unauthorised Re-Identification + accepted + + - - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High - High Risk (RM7x7 S:5 L:4) - - + + Something that acts as or causes Component Failure + - 0.41,xsd:decimal - Harshvardhan J. Pandit + Component Failure accepted - 2022-08-17 - + Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of + + + - - 2024-08-16 + + - - modified + High Severity + 0.75,xsd:decimal + accepted + Level where Severity is High + The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 Harshvardhan J. Pandit - - 2022-08-17 - Violation of Legal Obligations - Something that acts as or causes Violation of Legal Obligations - This concept was called "ViolationRegulatoryObligations" in DPV 2.0 - + 2022-08-18 + + + - - - Extremely High Risk (RM7x7 S:6 L:7) + + Moderate Risk accepted - - - + Level where Risk is Moderate + The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 + Harshvardhan J. Pandit - 2022-08-17 - 0.86,xsd:decimal - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High - - - + - - Level where Likelihood is Extremely Low - Extremely Low Likelihood 2022-08-18 - - 0.01,xsd:decimal - The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 - Harshvardhan J. Pandit - accepted - + 0.5,xsd:decimal + + + - + + Harshvardhan J. Pandit + Compromise Account + Something that acts as or causes a compromised account that is then used by the compromiser + 2024-08-16 - Harshvardhan J. Pandit - - - Spoofing 2022-08-17 - Something that acts as or causes Spoofing accepted - 2024-08-16 - + + + + - + + Harshvardhan J. Pandit + 2022-08-17 + Something that acts as or causes Account Credentials to be compromised - + + Compromise Account Credentials + 2024-08-16 accepted - 2024-05-19 - Control that removes the risk source - Remove Source + - Harshvardhan J. Pandit - - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 - + + - - Incident Suspected - - accepted - + + Control that avoids the risk source + 2024-05-19 + Avoid Source + + accepted + Harshvardhan J. Pandit - The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing - 2024-02-14 - + - - - - Incident Concluding Report + + Harshvardhan J. Pandit + Psychological Harm + 2022-08-17 + accepted - 2024-05-19 - A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known + + 2024-08-16 + + Something that acts as or causes Psychological Harm + - - + + + 2024-08-16 + accepted Harshvardhan J. Pandit - Something that acts as or causes Unauthorised Code Disclosure + Authorisation Failure + Something that acts as or causes Authorisation Failure + 2022-08-17 - - Unauthorised Code Disclosure - 2024-08-16 - accepted - - - - ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html + + + - - accepted - - - - Risk Mitigation Measure that controls the Source - 2024-05-19 - Source Control + Harshvardhan J. Pandit - - - + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High 2022-08-17 - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low - 0.08,xsd:decimal - + Very High Risk (RM7x7 S:5 L:5) + - Harshvardhan J. Pandit accepted - Very Low Risk (RM5x5 S:2 L:1) - - + 0.51,xsd:decimal + - + + Control that reduces the likelihood of an event + Reduce Likelihood + + Harshvardhan J. Pandit + 2024-05-19 + + + accepted - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low - 2022-08-17 - Very Low Risk (RM7x7 S:2 L:3) + + + + 2022-08-17 + accepted + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High + 0.40,xsd:decimal Harshvardhan J. Pandit - 0.12,xsd:decimal - + High Risk (RM5x5 S:5 L:2) + - + + 2024-02-14 + + + + has risk source + + + Indicates the risk (subject) has the indicated risk source (object) + accepted - The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring - - - - 2024-02-14 - Incident Mitigated - Harshvardhan J. Pandit - - - - - - - - Moderate Risk (RM7x7 S:7 L:2) - accepted - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate - Harshvardhan J. Pandit - 2022-08-17 - 0.29,xsd:decimal - - - Harshvardhan J. Pandit + + accepted - 2022-08-17 - - - - Very High Risk (RM5x5 S:3 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High - - 0.60,xsd:decimal - - - - 2024-08-16 - Something that acts as or causes Unauthorised Access to Premises - Harshvardhan J. Pandit - accepted - 2022-08-17 - Unauthorised Access to Premises + Something that acts as or causes Equipment Malfunction - - - - Delaram Golpayegani + Here equipment refers to physical equipment + 2022-08-17 + Equipment Malfunction 2024-08-16 - Misuse + + + + - Something that acts as or causes Misuse + Harshvardhan J. Pandit + 2022-08-17 + Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques + 2024-08-16 + + Brute Force Authorisations accepted - 2024-06-11 - + + + - - accepted - + - 2024-06-12 - Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk - Risk Management - ISO 31073:2022 Risk management vocabulary - + + Risks and issues that affect or have the potential to affect specific individuals + accepted + Individual Risk - + + 0.02,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low Harshvardhan J. Pandit + Extremely Low Risk (RM7x7 S:1 L:1) + accepted 2022-08-17 - 0.04,xsd:decimal - Extremely Low Risk (RM7x7 S:2 L:1) - - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - - + + Financial Loss + Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity - Lose of Customer Confidence - accepted + Harshvardhan J. Pandit 2022-08-17 - Something that acts as or causes Loss of Customer Confidence + - Harshvardhan J. Pandit 2024-08-16 - - - - Something that acts as or causes Identity Theft - Harshvardhan J. Pandit - Identity Theft accepted - + + + + + accepted + Extremely High Risk (RM7x7 S:7 L:5) - - 2024-08-16 - 2022-08-17 - - - Harshvardhan J. Pandit - 2024-08-16 + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High 2022-08-17 - This concept was called "ChildViolence" in DPV 2.0 - - - - - Violence against children - - Something that acts as or causes Child Violence - accepted - + 0.71,xsd:decimal + - + - Very Low Risk (RM5x5 S:1 L:3) - + Harshvardhan J. Pandit + 2024-05-19 + Risk Mitigation Measure that controls the Source + - Harshvardhan J. Pandit accepted - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low - 2022-08-17 - 0.12,xsd:decimal - + Source Control + - - Low Risk (RM7x7 S:4 L:2) + + ENISA Reference Incident Classification Taxonomy 2018 + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + accepted - + - Harshvardhan J. Pandit - - 0.16,xsd:decimal + Extremely Low Risk (RM7x7 S:1 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low + 0.04,xsd:decimal 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low + + Harshvardhan J. Pandit - - + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - - 2024-02-14 - has control - - Indicates the use of specified control - - - accepted - - - - Harshvardhan J. Pandit - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High - 0.99,xsd:decimal - + + Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate + + Moderate Risk (RM3x3 S:2 L:2) - accepted + Harshvardhan J. Pandit + 0.44,xsd:decimal 2022-08-17 - Extremely High Risk (RM7x7 S:7 L:7) - - - accepted - Indicates an incident is associated with the specified context - - - - has incident - - - 2024-02-14 + - + + + 2022-08-18 - Harshvardhan J. Pandit + Something that acts as or causes Limitation of Rights 2024-08-16 - Terrorism - - Something that acts as or causes Terrorism - + Limitation of Rights + This concept was called "LimitationOfRights" in DPV 2.0 accepted - 2022-08-17 + Georg P. Krog, Harshvardhan J. Pandit - - - https://www.iso.org/standard/72140.html - IEC 31010:2019 - - - Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High - + + Extremely Low Risk (RM7x7 S:2 L:2) + accepted + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low + 0.08,xsd:decimal + Harshvardhan J. Pandit 2022-08-17 - 0.67,xsd:decimal - High Risk (RM3x3 S:3 L:2) - - + - - Incident Impact Assessment - Harshvardhan J. Pandit - 2024-05-19 - + + - An impact assessment associated with a incident + Something that acts as or causes Misuse + 2024-08-16 + Delaram Golpayegani + 2024-06-11 accepted + Misuse + - - - - refers to risk - - - - - Indicates the incident (subject) is a materialisation of the indicated risk (object) - 2024-02-14 - + accepted - - - - - - - Availability Incident - 2024-05-19 - Incident where the availability of information or system has been affected - accepted - - - - An actual or occured event - - - - 2024-08-16 + Something that acts as or causes Malicious Code Attack - Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez - 2024-02-14 - 2024-05-19 - accepted - Incident - Incident is realised or materialised risk + Harshvardhan J. Pandit + Malicious Code Attack + 2022-08-17 + + + + + + - - 2024-08-16 - - System Failure - Harshvardhan J. Pandit - accepted - + + + Something that acts as or causes Scam + 2024-08-16 2022-08-17 - Here system refers to both hardware and software systems - Something that acts as or causes System Failure - - - - - - Axel Polleres - Rob Brennan - Julian Flake - Fajar Ekaputra - Beatriz Esteves - Julio Fernandez - Delaram Golpayegani - Georg P. Krog + accepted + Scam + + Harshvardhan J. Pandit - Delaram Golpayegani - Beatriz Esteves - Julian Flake - Rob Brennan - Harshvardhan J. Pandit - Paul Ryan - Georg P. Krog - https://w3id.org/dpv/risk - 2.1-dev - https://w3id.org/dpv/risk# - - - - - 2024-07-13 - 2022-08-14 - Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management - - - - - - - - - 2.1-dev - 10.5281/zenodo.12505841 - - http://www.w3.org/2004/02/skos/core - - http://www.w3.org/2000/01/rdf-schema - Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 - - - - 2022-08-14 - http://purl.org/ontology/bibo/status/published - RISK - Risk Concepts - - - risk + + - - - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate + + ENISa Trust Services Security Incidents 2021 + https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 + + + accepted - 0.24,xsd:decimal - - - 2022-08-17 + Something that acts as or causes Security Breach + Security Breach Harshvardhan J. Pandit - Moderate Risk (RM7x7 S:4 L:3) - - - - Something that acts as or causes Component Failure - Component Failure - accepted - Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of + + 2024-08-16 + + + - - https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 - - - + + Detriment + - Georg P. Krog, Harshvardhan J. Pandit - 2022-08-18 + 2022-03-23 + accepted + + Something that acts as or causes Detriment + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves 2024-08-16 - This concept was called "PreventExercisingOfRights" in DPV 2.0 - Something that acts as or causes Prevent Exercising of Rights + + + + + + - Prevent Exercising of Rights + 2024-08-16 + Georg P. Krog + Social Disadvantage + Something that acts as or causes Social Disadvantage accepted + 2022-08-19 - - Something that acts as or causes Erroneous System Use + 2022-08-17 - Erroneous System Use + Moderate Risk (RM7x7 S:5 L:3) + accepted + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate + - - Harshvardhan J. Pandit - - 2024-08-16 + 0.31,xsd:decimal - accepted - + Harshvardhan J. Pandit + - + - + - 2024-02-14 + 0.04,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low + 2022-08-17 + Extremely Low Risk (RM7x7 S:2 L:1) accepted - Harshvardhan J. Pandit - Incident Near Miss - The state where an incident was almost successful in taking place i.e. "it came very close" - + Harshvardhan J. Pandit + - - Moderate Risk (RM5x5 S:3 L:2) - + + + - - 0.24,xsd:decimal + accepted + 2024-08-16 + Unwanted Code Deletion Harshvardhan J. Pandit + Something that acts as or causes Unwanted Code Deletion + 2022-08-17 - accepted - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate - + + + - + + Harshvardhan J. Pandit - accepted - Scale with 5 Risk Levels from Very High to Very Low 2022-08-18 - 5 Risk Levels + accepted + Scale with 5 Risk Levels from Very High to Very Low - - + + 2022-08-17 + 0.12,xsd:decimal + Very Low Risk (RM7x7 S:3 L:2) + + accepted + Harshvardhan J. Pandit - 2022-08-17 - 0.61,xsd:decimal - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low + + + + A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures + Harshvardhan J. Pandit + + + + 2022-08-18 + + Risk Analysis accepted - Extremely High Risk (RM7x7 S:5 L:6) - - - - - is exploited by + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + 2024-02-14 + + - + + + Indicates the threat (subject) has the indicated source (object) + has threat source accepted - 2024-02-14 - - Indicates the vulnerability (subject) is exploited by the indicated threat (object) - - + + - Harshvardhan J. Pandit - Psychological Harm + The criteria for what is considered material damage is based in jurisdictional laws and norms + 2022-03-30 accepted 2024-08-16 - 2022-08-17 - Something that acts as or causes Psychological Harm + Non-Material Damage + Something that acts as or causes Non-Material Damage - - + Harshvardhan J. Pandit + - - 0.11,xsd:decimal - Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - - Low Risk (RM3x3 S:1 L:1) - accepted + - Harshvardhan J. Pandit - 2022-08-17 - - - - - Something that acts as or causes Distributed Denial of Service Attack (DDoS) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low accepted + 2022-08-17 - Distributed Denial of Service Attack (DDoS) + 0.16,xsd:decimal + Low Risk (RM7x7 S:4 L:2) + Harshvardhan J. Pandit + + + + Scale with 5 Likelihood Levels from Very High to Very Low + - + 5 Likelihood Levels + accepted + Harshvardhan J. Pandit - - 2024-08-16 - + 2022-08-18 + - - accepted + + 2022-08-18 + - - Low Risk (RM7x7 S:3 L:3) + 7 Likelihood Levels + accepted + Scale with 7 Likelihood Levels from Extremely High to Extremely Low - 0.18,xsd:decimal - 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low Harshvardhan J. Pandit - + - + + 2022-08-17 + 0.37,xsd:decimal + accepted Harshvardhan J. Pandit - accepted - 0.61,xsd:decimal - Very High Risk (RM7x7 S:6 L:5) - 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High + High Risk (RM7x7 S:6 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High - - https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 - - - 2024-08-16 - 2022-08-17 - Violation of Statutory Obligations - - Harshvardhan J. Pandit + + A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again - This concept was called "ViolationStatutoryObligations" in DPV 2.0 - modified + 2024-05-19 + - - Something that acts as or causes Violation of Statutory Obligations - + Incident Mitigation Measure + accepted - - Very Low Severity + + + + + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High + Extremely High Risk (RM7x7 S:7 L:6) - 0.1,xsd:decimal Harshvardhan J. Pandit + 2022-08-17 accepted - Level where Severity is Very Low - The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 - - - - 2022-08-18 - - + 0.86,xsd:decimal + - + + Something that acts as or causes Unauthorised Code Modification - + 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High - 0.57,xsd:decimal + accepted + 2024-08-16 + Unauthorised Code Modification + - Very High Risk (RM7x7 S:7 L:4) Harshvardhan J. Pandit - accepted - + + - + - Accidental Misuse - Accidental Misuse - + Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk accepted - + Risk Management + + 2024-06-12 + ISO 31073:2022 Risk management vocabulary - + + 2022-08-17 + accepted + - + Something that acts as or causes Identity Theft + Identity Theft Harshvardhan J. Pandit - Reduce Severity - Control that reduces the severity of an event + + 2024-08-16 - accepted - 2024-05-19 - + + - + - + - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low - Low Risk (RM7x7 S:5 L:2) + Extremely High Risk + accepted + The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 Harshvardhan J. Pandit - accepted - 2022-08-17 - 0.20,xsd:decimal - + 2022-08-18 + Level where Risk is Extremely High + 0.99,xsd:decimal + - - - - - - - 2024-02-14 - - has threat source - Indicates the threat (subject) has the indicated source (object) - + + Reduction Control + + + accepted + 2024-05-19 + + Control that reduces the likelihood or severity of an event + - + Harshvardhan J. Pandit - - accepted - Lose of Goodwill + Intercept Communications + This concept was called "InterceptionCommunications" in DPV 2.0 + 2022-08-17 + Something that acts as or causes Interception of Communications + modified - 2022-08-17 - Something that acts as or causes Loss of Goodwill 2024-08-16 - + + + + + + ISO/IEC 27005:2018 + + https://www.iso.org/standard/75281.html 2022-08-17 - Violating Code of Conduct - 2024-08-16 - + 2024-08-16 + This concept was called "ViolationCodeConduct" in DPV 2.0 + Violating Code of Conduct + Something that acts as or causes Violation of Code of Conduct + + modified Harshvardhan J. Pandit - Something that acts as or causes Violation of Code of Conduct - - This concept was called "ViolationCodeConduct" in DPV 2.0 - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - + + + Harshvardhan J. Pandit + Level where Likelihood is Moderate + Moderate Likelihood + 2022-08-18 + - - - - Data Breach - Harshvardhan J. Pandit - Something that acts as or causes Data Breach + 0.5,xsd:decimal accepted - 2024-08-16 - 2022-08-17 - - - + The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 + + + - - The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring + - + + Remove Impact + Control that removes Impact i.e. prevents it from materialising - 2024-02-14 - accepted - Incident Terminated Harshvardhan J. Pandit - - - - modified - 2024-08-16 - Something that acts as or causes Violation of Contractual Obligations - - 2022-08-17 - - - - Harshvardhan J. Pandit - - This concept was called "ViolationContractualObligations" in DPV 2.0 - Violation of Contractual Obligation - + accepted + 2024-05-19 + - + + - - Harshvardhan J. Pandit - 2022-08-18 - 0.25,xsd:decimal - Low Risk - The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 + 0.61,xsd:decimal accepted - Level where Risk is Low - - - - - 2022-08-17 - + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High + Harshvardhan J. Pandit + Extremely High Risk (RM7x7 S:5 L:6) + + + + - Harshvardhan J. Pandit - Something that acts as or causes Personal Safety Endangerment - - Personal Safety Endangerment - 2024-08-16 - + Accidental Misuse accepted - - - - - - 2024-02-14 - - - is vulnerability of - accepted - Indicates the vulnerability (subject) is associated with indicated context (object) + Accidental Misuse + - - - - + + Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other. - Incident Halted Harshvardhan J. Pandit + Risk Matrix + + + + accepted 2024-02-14 - The incident has halted or paused with a high likelihood of resuming or recurring - + - + + 2022-08-17 accepted + + Something that acts as or causes Malware Attack + 2024-08-16 - Harshvardhan J. Pandit - 2022-08-17 - Something that acts as or causes Vulnerability Created - - 2024-08-16 - Vulnerability Created - + Harshvardhan J. Pandit + Malware Attack + + + + - + - A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence - accepted - 2024-05-19 + Harshvardhan J. Pandit + Something that acts as or causes Loss of Reputation + - Incident Handling Report - + 2024-08-16 + 2022-08-17 + accepted + Lose of Reputation + + + Level where Likelihood is Extremely High + The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 Extremely High Likelihood + + Harshvardhan J. Pandit 2022-08-18 0.99,xsd:decimal accepted - Level where Likelihood is Extremely High - - Harshvardhan J. Pandit - The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 - - - accepted - 2024-02-14 - Risk Source + + - The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk - 2024-08-16 + accepted + + - + + accepted + + + + Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of + Something that acts as or causes Component Malfunction + + Component Malfunction + + + + + + + + accepted + Incident Ongoing Harshvardhan J. Pandit + 2024-02-14 + The incident is ongoing i.e. still active + + + accepted - 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High - + 2024-02-14 + + Indicates the threat (subject) exploits the indicated vulnerability (object) + + exploits vulnerability + + + + + + + + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low + - 0.73,xsd:decimal - Extremely High Risk (RM7x7 S:6 L:6) + Harshvardhan J. Pandit + 2022-08-17 + + Very Low Risk (RM7x7 S:2 L:3) + accepted + 0.12,xsd:decimal - - A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known - 2024-05-19 + + - + Control that removes the risk source - Incident Preliminary Report + Remove Source accepted + Harshvardhan J. Pandit + 2024-05-19 + - - + + Something that acts as or causes Sexual Violence + Harshvardhan J. Pandit - 2024-08-16 2022-08-17 - This concept was called "Corruption Data" in DPV 2.0 - - modified - Something that acts as or causes Corruption of Data - Data Corruption - + accepted + 2024-08-16 + + Sexual Violence + - - ENISA Methodology for Sectoral Cybersecurity Assessments + - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - - accepted + + + Something that acts as or causes benefits + 2022-03-23 + - 2024-02-14 - Harshvardhan J. Pandit - - Status associated with an incident - - Incident Status - + accepted + 2024-08-16 + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres + Benefit + - - ENISA Threat Taxonomy 2016 + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - accepted - - - - Harshvardhan J. Pandit - 2022-08-17 - A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types - Risk Matrix 3x3 + - - - - Something that acts as or causes Unauthorised Resource Use - Unauthorised Resource Use - Harshvardhan J. Pandit - 2024-08-16 2022-08-17 - - + Something that acts as or causes Unwanted Disclosure of Data + + Harshvardhan J. Pandit + Unwanted Disclosure of Data accepted + 2024-08-16 + - + + Very High Risk (RM7x7 S:7 L:4) + 2022-08-17 - + - 2024-02-14 accepted - Incident Concluded - The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High Harshvardhan J. Pandit - + 0.57,xsd:decimal + - - - accepted - Very Low Risk (RM7x7 S:1 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low - - - - Harshvardhan J. Pandit + 2022-08-17 - 0.10,xsd:decimal - - - - Very Low Risk (RM5x5 S:1 L:2) - + + + + accepted + 2024-08-16 + Spoofing - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low Harshvardhan J. Pandit - accepted - 2022-08-17 - 0.08,xsd:decimal - + Something that acts as or causes Spoofing + + + + - - Harshvardhan J. Pandit - accepted - 2022-08-17 - 0.20,xsd:decimal - Low Risk (RM7x7 S:2 L:5) + - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low + Harshvardhan J. Pandit + - - + 2022-08-18 + High Risk + Level where Risk is High + The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 + 0.75,xsd:decimal + accepted + + + - - Risks and issues that affect or have the potential to affect specific individuals - Individual Risk + + - + 2024-05-19 accepted + + Harshvardhan J. Pandit + Monitor Impact + Control that monitors a Risk Impact + - + + Something that acts as or causes Distributed Denial of Service Attack (DDoS) + 2024-08-16 - Harshvardhan J. Pandit + Harshvardhan J. Pandit 2022-08-17 - Something that acts as or causes Unauthorised Data Modification - Unauthorised Data Modification - - 2024-08-16 + Distributed Denial of Service Attack (DDoS) accepted + + - + + - - High Likelihood - - 0.75,xsd:decimal accepted - Level where Likelihood is High - Harshvardhan J. Pandit 2022-08-18 - The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 - - - - - - Examples for Data Privacy Vocabulary - - - - - + Harshvardhan J. Pandit + + 3 Severity Levels + Scale with 3 Severity Levels from High to Low + - - + + Harshvardhan J. Pandit + + Risk Mitigation Measure that controls Impacts accepted - Georg P. Krog - 2024-08-16 - Something that acts as or causes Social Disadvantage - Social Disadvantage - 2022-08-19 + 2024-05-19 - + Impact Control + - + + + + + Control to remedy consequences of event + 2024-05-19 + Remedy Control accepted + + + + - + accepted + Monitor Vulnerabilities + Harshvardhan J. Pandit - Identity Fraud - 2022-08-17 - - 2024-08-16 - Something that acts as or causes Identity Fraud - + Control that monitors a Risk Vulnerability + 2024-05-19 + - - Unauthorised System Modification - - 2024-08-16 - 2022-08-17 - Something that acts as or causes Unauthorised System Modification - Harshvardhan J. Pandit + + 0.14,xsd:decimal accepted - + Harshvardhan J. Pandit + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low + - + 2022-08-17 + Low Risk (RM7x7 S:7 L:1) + - + accepted - + - Harshvardhan J. Pandit - 2024-05-19 - Remove Consequence - Control that removes Consequence i.e. prevents it from materialising + Very High Risk (RM5x5 S:4 L:4) - + Harshvardhan J. Pandit + 2022-08-17 + 0.64,xsd:decimal + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High + - - + + Harshvardhan J. Pandit + 2022-08-18 + Level where Likelihood is High + - Control to identify characteristics of event + 0.75,xsd:decimal accepted - Identification Control - 2024-05-19 - + The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 + High Likelihood + + + - - - + accepted - Indicates the associated context (subject) has indicated vulnerability (object) - - has vulnerability + + + Indicates the vulnerability (subject) is exploited by the indicated threat (object) + + is exploited by + 2024-02-14 - 2024-02-14 - - + - - - - accepted - 2024-05-19 - Control to contain event - Containment Control - - - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves - + + Something that acts as or causes Damage + - Detriment - accepted 2024-08-16 - 2022-03-23 - Something that acts as or causes Detriment + Damage + accepted + 2022-03-30 + Harshvardhan J. Pandit - - - 2024-05-19 - A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again - accepted - Incident Mitigation Measure - + + 2024-08-16 - - - - - Risks and issues that have their origin in environment or can affect the environment at large - Environmental Risk - + accepted - + 2022-08-17 + Unwanted Data Deletion + Harshvardhan J. Pandit + + Something that acts as or causes Unwanted Data Deletion + + + - - Re-identification - Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification - 2022-08-19 - + + - Harshvardhan J. Pandit + 2022-08-17 + Very High Risk (RM5x5 S:5 L:4) + 0.80,xsd:decimal + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High accepted + Harshvardhan J. Pandit + + + + + Incident is realised or materialised risk + Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez + + + + 2024-08-16 + 2024-05-19 + 2024-02-14 - Something that acts as or causes Re-identification - + Incident + + + An actual or occured event + accepted - - + + - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low + 2022-08-17 - 0.12,xsd:decimal accepted - Very Low Risk (RM7x7 S:1 L:6) + Something that acts as or causes Unauthorised Access to Premises + 2024-08-16 + + Unauthorised Access to Premises Harshvardhan J. Pandit - 2022-08-17 - + + + + - + - + Something that acts as or causes Phishing Scam + accepted 2024-08-16 + Phishing Scam - Coercion - Harshvardhan J. Pandit - accepted - Something that acts as or causes Coercion + 2022-08-17 + Harshvardhan J. Pandit + - - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low - 2022-08-17 - Low Risk (RM7x7 S:1 L:7) - 0.14,xsd:decimal - accepted - + + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low + - Harshvardhan J. Pandit + 0.08,xsd:decimal + Harshvardhan J. Pandit + 2022-08-17 + accepted + Extremely Low Risk (RM7x7 S:4 L:1) - - + + 0.12,xsd:decimal + Harshvardhan J. Pandit + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low + 2022-08-17 + - - - Harshvardhan J. Pandit - Here equipment refers to physical equipment + Very Low Risk (RM5x5 S:3 L:1) accepted - Equipment Failure - 2024-08-16 - 2022-08-17 - Something that acts as or causes Equipment Failure - + + - - - + + accepted + Incident Suspected Report + A report describing the suspicion of an incident in the past or occuring - - Harshvardhan J. Pandit - 2022-08-17 - Denial of Service Attack (DoS) - Something that acts as or causes Denial of Service Attack (DoS) - 2024-08-16 - accepted - + + 2024-05-19 - - ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - - + + 0.20,xsd:decimal + + Low Risk (RM7x7 S:5 L:2) Harshvardhan J. Pandit + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low 2022-08-17 accepted - 0.67,xsd:decimal - High Risk (RM3x3 S:2 L:3) - Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - + - + accepted - 2024-05-19 - + Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + Reward + + 2024-04-14 + - Control that changes Consequence - Harshvardhan J. Pandit - Change Consequence - - + 2024-08-16 + Georg P. Krog, Harshvardhan J. Pandit + - - 0.04,xsd:decimal + + Harshvardhan J. Pandit + An impact assessment associated with a incident + 2024-05-19 + + + Incident Impact Assessment + + accepted + + + + + accepted + Something that acts as or causes Blackmail + + Blackmail + + Harshvardhan J. Pandit 2022-08-17 + 2024-08-16 + + + + + 0.99,xsd:decimal + Level where Severity is Extremely High + + + + Extremely High Severity + 2022-08-18 + accepted + The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 + Harshvardhan J. Pandit + + + + - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low + 2022-08-17 + 0.86,xsd:decimal + accepted + Extremely High Risk (RM7x7 S:6 L:7) - Extremely Low Risk (RM7x7 S:1 L:2) + Harshvardhan J. Pandit + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High - + + Control to contain event + + + + accepted - 2022-08-17 - 0.37,xsd:decimal + 2024-05-19 + Containment Control + + + + + A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known + 2024-05-19 + + accepted + Incident Concluding Report + + + accepted + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate + 0.29,xsd:decimal + Moderate Risk (RM7x7 S:2 L:7) + - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High + Harshvardhan J. Pandit - High Risk (RM7x7 S:3 L:6) + 2022-08-17 - - Something that acts as or causes benefits + + + Something that acts as or causes Violation of Statutory Obligations + modified 2024-08-16 - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres - + 2022-08-17 + + This concept was called "ViolationStatutoryObligations" in DPV 2.0 - Benefit - 2022-03-23 + Violation of Statutory Obligations + Harshvardhan J. Pandit + + + + Something that involves or causes judicial costs to be paid + + + accepted + + Judicial Costs - - 2022-08-17 + - accepted - 0.48,xsd:decimal - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + 0.43,xsd:decimal + Very High Risk (RM7x7 S:3 L:7) + accepted + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High + 2022-08-17 Harshvardhan J. Pandit - High Risk (RM5x5 S:4 L:3) - + - - Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + + 2024-08-16 - Reward - 2024-04-14 - Georg P. Krog, Harshvardhan J. Pandit - 2024-08-16 + Harshvardhan J. Pandit + Something that acts as or causes Sabotage + Sabotage + 2022-08-17 + accepted - + + + - - ENISA Threat Landscape 2021 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 - - - - Georg P. Krog, Harshvardhan J. Pandit + + Harshvardhan J. Pandit + - + Very High Severity + The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 + Level where Severity is Very High - Payment - Something that acts as or provides payment e.g. to access a service or purchase resources + 2022-08-18 + 0.9,xsd:decimal accepted - 2024-08-16 - 2024-04-14 - + + - - + + + Georg P. Krog, Harshvardhan J. Pandit + Violation of Rights + This concept was called "ViolationOfRights" in DPV 2.0 - Concepts associated with security threats that are likely to originate externally + 2024-08-16 + 2022-08-18 + Something that acts as or causes Violation of Rights accepted - External Security Threat - + - - Level where Risk is High + - 0.75,xsd:decimal - High Risk - Harshvardhan J. Pandit - accepted + The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 + Very Low Risk + 0.1,xsd:decimal 2022-08-18 - The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 - + accepted + Harshvardhan J. Pandit + Level where Risk is Very Low - - 2024-04-14 + + 2022-08-17 - accepted - + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low + - Something that acts as or provides renumeration which is in monetary or financial form - 2024-08-16 - Georg P. Krog, Harshvardhan J. Pandit - Remuneration - - - - A report describing the suspicion of an incident in the past or occuring - accepted - 2024-05-19 - Incident Suspected Report + Very Low Risk (RM7x7 S:1 L:5) + 0.10,xsd:decimal + Harshvardhan J. Pandit + + + + 0.11,xsd:decimal + 2022-08-17 + - - - - Something that acts as or causes Confidentiality Breach - Confidentiality Breach - 2024-08-16 + accepted Harshvardhan J. Pandit - accepted - - - - - 2022-08-17 - + Low Risk (RM3x3 S:1 L:1) + Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low + - - + + + Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised. - Security Attack - Something that acts as or causes an attack on security with the aim of undermining it + Monitor Control + Risk Mitigation Measure that uses controls to monitor events + 2024-05-19 + Harshvardhan J. Pandit accepted - - - - - - - - Risk Concepts - JSON-LD serialiation - + - - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - accepted - 2022-08-17 - High Risk (RM5x5 S:3 L:4) - Harshvardhan J. Pandit + + Risk Source - - 0.48,xsd:decimal - + 2024-08-16 + The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk + accepted + 2024-02-14 + - - + + 2024-08-16 + This concept was called "ViolationEthicalCode" in DPV 2.0 + 2022-08-17 + + Violating Ethics Code - Something that acts as or causes Component Malfunction - Component Malfunction - Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of - accepted - + Harshvardhan J. Pandit + + Something that acts as or causes Violation of Ethics Code + modified + - - + + Control to detect event + + Detection Control + 2024-05-19 + - Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other. - Risk Matrix - - - Harshvardhan J. Pandit accepted - 2024-02-14 - + - - 2024-08-16 + 2022-08-17 - Something that acts as or causes Unwanted Disclosure of Data - Harshvardhan J. Pandit - accepted - + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High + 0.60,xsd:decimal + + Harshvardhan J. Pandit - Unwanted Disclosure of Data - - + Very High Risk (RM5x5 S:3 L:5) + accepted + - + - + Harshvardhan J. Pandit + Moderate Risk (RM7x7 S:4 L:3) + + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate + 0.24,xsd:decimal accepted - Harshvardhan J. Pandit - 7 Likelihood Levels - 2022-08-18 - Scale with 7 Likelihood Levels from Extremely High to Extremely Low - + 2022-08-17 + - + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 - - - accepted - 2024-05-19 - Confidentiality Incident - - Incident where the confidentiality of information or system has been affected - - - - - accepted - - - - Risk Assessment - - Assessment of risk involving its identification, analysis, and evaluation - ISO 31073:2022 Risk management vocabulary - 2024-02-14 + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + - + - accepted - Something that involves or causes judicial costs to be paid + Harshvardhan J. Pandit + - - Judicial Costs - + 0.25,xsd:decimal + 2022-08-18 + Low Likelihood + Level where Likelihood is Low + accepted + The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 + + + - + + Individual Health & Safety - Harshvardhan J. Pandit - Something that acts as or causes Cryptojacking - accepted - 2024-08-16 - 2022-08-17 - Cryptojacking - + - - + + - - accepted - - Lose of Credibility - Harshvardhan J. Pandit - 2024-08-16 2022-08-17 - Something that acts as or causes Loss of Credibility - - - + accepted + Low Risk (RM5x5 S:4 L:1) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low + Harshvardhan J. Pandit + 0.16,xsd:decimal + + + + Something that acts as or causes Fraud accepted + 2024-08-16 - Harm - 2022-08-13 - Something that acts as or causes Harm to humans - 2024-08-16 - This concept refers to the general abstract notion of harm + - + Harshvardhan J. Pandit + Fraud + 2022-08-17 + + - - + + + Harshvardhan J. Pandit + 0.99,xsd:decimal + - The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 - Level where Risk is Extremely Low + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High + 2022-08-17 accepted - 2022-08-18 - Extremely Low Risk - Harshvardhan J. Pandit - 0.01,xsd:decimal - - + Very High Risk (RM5x5 S:5 L:5) + - + + Harshvardhan J. Pandit - Concepts associated with risks that arise due to User or Human use accepted - User Risks - + 2024-08-16 + Public Order Breach + + Something that acts as or causes Public Order Breach + 2022-08-17 + - - + + accepted + + Harshvardhan J. Pandit + 0.67,xsd:decimal + - - Injury - Something that acts as or causes Injury - - 2024-08-16 + Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + High Risk (RM3x3 S:3 L:2) 2022-08-17 - Harshvardhan J. Pandit - accepted - + - - 0.5,xsd:decimal + + + 3 Risk Levels Harshvardhan J. Pandit - + - - Moderate Risk - Level where Risk is Moderate - accepted - The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 + Scale with 3 Risk Levels from High to Low 2022-08-18 - - - + accepted + - + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + + + - + - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low - - Harshvardhan J. Pandit + Environmental Risk + Risks and issues that have their origin in environment or can affect the environment at large accepted - Very Low Risk (RM5x5 S:1 L:1) - 2022-08-17 - 0.04,xsd:decimal - + - + - Georg P. Krog + 2022-08-17 + accepted 2024-08-16 - 2022-08-19 + Unauthorised Information Disclosure + Something that acts as or causes Unauthorised Information Disclosure - Something that acts as or causes Discrimination - accepted - Discrimination - + Harshvardhan J. Pandit + + + - - Notice associated with an Incident - - - accepted - Incident Notice - 2024-05-19 + - - - - - - - Guides for Data Privacy Vocabulary - - - - - Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate - 2022-08-17 - - Moderate Risk (RM3x3 S:1 L:3) + 2022-08-17 0.33,xsd:decimal accepted + Moderate Risk (RM3x3 S:3 L:1) Harshvardhan J. Pandit + Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - - - - - Harshvardhan J. Pandit - Extremely High Risk (RM7x7 S:7 L:5) - 0.71,xsd:decimal - - accepted - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High - 2022-08-17 - - - - + + - Scale with 7 Severity Levels from Extremely High to Extremely Low - 2022-08-18 - 7 Severity Levels Harshvardhan J. Pandit + Change Impact + 2024-05-19 + Control that changes Impact accepted - + - + + - + - Level where Severity is Extremely Low - Extremely Low Severity - The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 - 0.01,xsd:decimal + accepted + Unauthorised Data Modification Harshvardhan J. Pandit - accepted - 2022-08-18 - + Something that acts as or causes Unauthorised Data Modification + 2024-08-16 + 2022-08-17 + + - - 0.08,xsd:decimal - + + 2024-08-16 + Something that acts as or causes Human Errors + - Very Low Risk (RM7x7 S:1 L:4) + accepted + Human Errors - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low Harshvardhan J. Pandit 2022-08-17 - accepted - + + - - 2022-08-17 - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + Harshvardhan J. Pandit + Low Severity + 2022-08-18 + Level where Severity is Low + - - Sexual Violence - - Something that acts as or causes Sexual Violence - 2024-08-16 - Harshvardhan J. Pandit + 0.25,xsd:decimal accepted - + The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 + + + + - - Harshvardhan J. Pandit - accepted + - 2022-08-17 - 0.06,xsd:decimal + accepted + 0.20,xsd:decimal + Harshvardhan J. Pandit - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low - Extremely Low Risk (RM7x7 S:1 L:3) - + 2022-08-17 + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low + Low Risk (RM5x5 S:5 L:1) + - - Scale with 3 Likelihood Levels from High to Low - - 3 Likelihood Levels + Harshvardhan J. Pandit - accepted - + + - 2022-08-18 - - - - - Moderate Risk (RM3x3 S:3 L:1) - - - - 0.33,xsd:decimal - Harshvardhan J. Pandit + Something that acts as or causes Personal Safety Endangerment accepted 2022-08-17 - Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - + 2024-08-16 + + Personal Safety Endangerment + - - Something that acts as or causes violation of policy which can be either internal or external policy - Violating Policy + + Unauthorised Data Access + 2024-08-16 - accepted - + Something that acts as or causes Unauthorised Data Access + + + Harshvardhan J. Pandit + 2022-08-17 + + - + + 0.32,xsd:decimal - Moderate Risk (RM5x5 S:3 L:3) - accepted - 0.36,xsd:decimal - + Moderate Risk (RM5x5 S:4 L:2) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate + Harshvardhan J. Pandit - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate 2022-08-17 + accepted - - 2022-08-18 - The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 - Harshvardhan J. Pandit + + 2024-05-19 + - - - 0.9,xsd:decimal + Identifier associated with an incident accepted - Level where Likelihood is Very High - Very High Likelihood - - + Incident Identifier + - - 0.43,xsd:decimal - - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High - Very High Risk (RM7x7 S:3 L:7) - + + - Harshvardhan J. Pandit + 0.22,xsd:decimal accepted + + Harshvardhan J. Pandit + Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low + Low Risk (RM3x3 S:1 L:2) 2022-08-17 - + - + - Something that acts as or causes Non-Material Damage - The criteria for what is considered material damage is based in jurisdictional laws and norms + Denial of Service Attack (DoS) accepted + 2022-08-17 + 2024-08-16 + + Something that acts as or causes Denial of Service Attack (DoS) + Harshvardhan J. Pandit - Harshvardhan J. Pandit - 2022-03-30 - Non-Material Damage - 2024-08-16 - + + - - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low - - accepted - 0.12,xsd:decimal - 2022-08-17 + + modified + DGA 2.10 + 2024-08-16 - + - Harshvardhan J. Pandit - Very Low Risk (RM5x5 S:3 L:1) - + 2024-04-14 + Georg P. Krog, Harshvardhan J. Pandit + Fee + Something that acts as or provides fees e.g. for using a service + + - + + Control that monitors a Risk Source + + + - accepted - Incident Detection Report - A report describing the detection of a Incident - + Monitor Risk Source + Harshvardhan J. Pandit 2024-05-19 + accepted + + + + Copyright Violation + - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - ENISA Reference Incident Classification Taxonomy 2018 - - - - Something that acts as or causes Loss of Opportunity + 2022-08-17 2024-08-16 + Something that acts as or causes Copyright Violation accepted - - - - Lose of Opportunity Harshvardhan J. Pandit - 2022-08-17 - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + - + https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + ISO/IEC 27005:2018 - - + + accepted + - Harshvardhan J. Pandit - accepted - 0.12,xsd:decimal - 2022-08-17 - Very Low Risk (RM7x7 S:3 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low - - - - - has risk source - Indicates the risk (subject) has the indicated risk source (object) - - 2024-02-14 - - - - accepted - - + Something that acts as or causes violation of policy which can be either internal or external policy + Violating Policy + - - - Cross-Border Incident + - accepted - 2024-05-19 - Incident involving cross-border or multiple jurisdictions + Harshvardhan J. Pandit + A register recording incidentes, their reports, notifications, and other related activities + Incident Register - - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 - - - Detection Control - + + 2024-05-19 accepted + + - Control to detect event - 2024-05-19 - - - + accepted 2024-05-19 - Environmental Incident - - - + Harshvardhan J. Pandit + Remove Consequence + Control that removes Consequence i.e. prevents it from materialising - Incident caused due to environmental factors outside human controls - accepted + - - Low Risk (RM5x5 S:1 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low - + + Identity Fraud + 2024-08-16 + 2022-08-17 + - Harshvardhan J. Pandit - accepted - 0.20,xsd:decimal - 2022-08-17 - + + Something that acts as or causes Identity Fraud + + Harshvardhan J. Pandit + + - + + 2024-08-16 + Data Corruption + Harshvardhan J. Pandit - accepted + + 2022-08-17 + modified + This concept was called "Corruption Data" in DPV 2.0 + + + Something that acts as or causes Corruption of Data + + + + + + High Risk (RM5x5 S:2 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High + 2022-08-17 + accepted + 0.40,xsd:decimal - 2022-03-30 - Damage - 2024-08-16 - Something that acts as or causes Damage - + Harshvardhan J. Pandit + - - - - - Risk Mitigation Measure that uses controls to monitor events - 2024-05-19 - Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised. + + + + is vulnerability of - Harshvardhan J. Pandit + Indicates the vulnerability (subject) is associated with indicated context (object) + + accepted - Monitor Control - + 2024-02-14 - - 2022-08-17 - - 2024-08-16 + accepted - Something that acts as or causes Impact to Rights - Harshvardhan J. Pandit - + - Impact to Rights - This concept was called "ImpactToRights" in DPV 2.0 - - + Harshvardhan J. Pandit + Very High Risk (RM7x7 S:6 L:5) + 0.61,xsd:decimal + 2022-08-17 + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High + - + + Harm + Something that acts as or causes Harm to humans - accepted - Judicial Penalty - Something that involves or causes judicial penalties to be paid - - - - - - Authorisation Failure + Harshvardhan J. Pandit + This concept refers to the general abstract notion of harm 2024-08-16 - 2022-08-17 - Something that acts as or causes Authorisation Failure + 2022-08-13 accepted - - - - Harshvardhan J. Pandit - + - + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ ENISA Reference Incident Classification Taxonomy 2018 - - Harshvardhan J. Pandit - accepted - + - - - Something that acts as or causes Copyright Violation - - 2022-08-17 - 2024-08-16 - Copyright Violation - - - - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High - 0.64,xsd:decimal - - + accepted + Low Risk (RM5x5 S:2 L:2) + Harshvardhan J. Pandit + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low + 0.16,xsd:decimal 2022-08-17 - accepted - Very High Risk (RM5x5 S:4 L:4) - + + Harshvardhan J. Pandit - accepted - 2024-05-19 + - + - Monitor Control + 2024-08-16 + 2022-08-17 + Something that acts as or causes Loss of Goodwill + accepted + Lose of Goodwill + + + + 2024-02-14 + has control + + + - Control that monitors another Control - + Indicates the use of specified control + accepted + - - Physical Harm - - - + + accepted + 2024-02-14 + + + + + Indicates an incident is associated with the specified context + has incident + + + + + + accepted - + 2024-02-14 + + Indicates the associated context (subject) is caused by the indicated vulnerability (object) + caused by vulnerability - - 2022-08-17 + + The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 + Harshvardhan J. Pandit + - - Something that acts as or causes Unauthorised System Access - Unauthorised System Access - 2024-08-16 + Level where Risk is Low + 2022-08-18 + 0.25,xsd:decimal - - Harshvardhan J. Pandit + Low Risk accepted - + + + - - 2024-08-16 - Something that acts as or causes Malicious Code Attack + + 2022-08-17 - - accepted + Harshvardhan J. Pandit - Harshvardhan J. Pandit - 2022-08-17 - Malicious Code Attack - + Something that acts as or causes Erroneous System Use + accepted + 2024-08-16 + + Erroneous System Use + - - Moderate Risk (RM3x3 S:2 L:2) + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + ENISA Threat Taxonomy 2016 + + + Extremely High Risk (RM7x7 S:5 L:7) + accepted - accepted - 2022-08-17 Harshvardhan J. Pandit - Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate - 0.44,xsd:decimal - + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High + 2022-08-17 + 0.71,xsd:decimal + - - - accepted - - - - Monitor Vulnerabilities + + + Julian Flake + Rob Brennan + Fajar Ekaputra Harshvardhan J. Pandit - Control that monitors a Risk Vulnerability - 2024-05-19 - + Beatriz Esteves + Axel Polleres + Georg P. Krog + Julio Fernandez + Delaram Golpayegani + Paul Ryan + Georg P. Krog + Delaram Golpayegani + Harshvardhan J. Pandit + Beatriz Esteves + Rob Brennan + Julian Flake + http://www.w3.org/2004/02/skos/core + + http://www.w3.org/2000/01/rdf-schema + + + + 10.5281/zenodo.12505841 + + + + + + + + + + + + + Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 + http://purl.org/ontology/bibo/status/published + 2022-08-14 + https://w3id.org/dpv/risk + Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management + 2.1-dev + + 2022-08-14 + + + RISK + risk + 2.1-dev + 2024-07-13 + Risk Concepts + https://w3id.org/dpv/risk# - + - + - Level where Likelihood is Very Low - - Harshvardhan J. Pandit - The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 - accepted - 0.1,xsd:decimal - Very Low Likelihood - 2022-08-18 - - - - - 0.25,xsd:decimal - 2022-08-18 + + accepted - The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 - - - + Something that acts as or causes Data Breach + 2024-08-16 + Data Breach + Harshvardhan J. Pandit - Level where Severity is Low - Low Severity - - - + 2022-08-17 + + + + - + 2022-08-17 - Very High Risk (RM7x7 S:5 L:5) - 0.51,xsd:decimal - - accepted - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High + - + + 2024-08-16 + accepted + Unauthorised System Access + Harshvardhan J. Pandit - + Something that acts as or causes Unauthorised System Access + + + - - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High - Very High Risk (RM5x5 S:5 L:4) - + + 2024-05-19 + Incident Report + + - Harshvardhan J. Pandit + Documented information about an incident, its handling, assessments,and notifications + accepted + + accepted - 0.80,xsd:decimal + Harshvardhan J. Pandit + Something that acts as or causes Injury 2022-08-17 - + + + + + Injury + 2024-08-16 + - - accepted - 2024-05-19 - Avoid Source - Control that avoids the risk source + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - + - Harshvardhan J. Pandit - + Societal Health & Safety + accepted + - - This concept was called "InterceptionCommunications" in DPV 2.0 - Something that acts as or causes Interception of Communications + + + A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known + 2024-05-19 - - modified + accepted + Incident Preliminary Report + + + Harshvardhan J. Pandit + Lose of Opportunity + 2022-08-17 - - Intercept Communications + + + + accepted + Something that acts as or causes Loss of Opportunity 2024-08-16 - + - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - Control that monitors a Risk Impact + 2024-05-19 Harshvardhan J. Pandit accepted - 2024-05-19 - Monitor Impact - + Reduce Severity + Control that reduces the severity of an event + - - 0.22,xsd:decimal + + 0.48,xsd:decimal + 2022-08-17 + Harshvardhan J. Pandit + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High + High Risk (RM5x5 S:3 L:4) accepted - Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low - Low Risk (RM3x3 S:2 L:1) - 2022-08-17 - - + - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + + 2024-05-19 - 2024-02-14 accepted - - Source of threat event, including both agent and non-agent sources - Threat Source - + Availability Incident + Incident where the availability of information or system has been affected - - - - 2024-08-16 - + + + 0.08,xsd:decimal Harshvardhan J. Pandit - accepted - Unwanted Data Deletion 2022-08-17 - Something that acts as or causes Unwanted Data Deletion - + + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low + Very Low Risk (RM5x5 S:1 L:2) + accepted + - - Risk Matrix 5x5 + - + - A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types Harshvardhan J. Pandit - accepted 2022-08-17 - + + accepted + Cryptojacking + Something that acts as or causes Cryptojacking + 2024-08-16 + + - - https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + + Very Low Risk (RM5x5 S:1 L:1) + accepted + + Harshvardhan J. Pandit + 0.04,xsd:decimal 2022-08-17 + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low + + + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 + + + + Harshvardhan J. Pandit - 0.71,xsd:decimal + + + + 2024-05-19 + accepted + Risk Mitigation Measure that shares Risk e.g. amongst stakeholders + Share Risk + + + + 0.37,xsd:decimal + + + - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High + Harshvardhan J. Pandit + 2022-08-17 + High Risk (RM7x7 S:3 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High accepted - Extremely High Risk (RM7x7 S:5 L:7) - + + Harshvardhan J. Pandit + Lose of Credibility + - Incident caused due to accidental actions arising from human or human-controlled situations + 2024-08-16 + + Something that acts as or causes Loss of Credibility accepted - Accidental Incident - 2024-05-19 - + 2022-08-17 + - - Things that cause or have the potential to impact financial resources + - accepted - Financial Impact - + - - - - - 2024-08-16 - Something that acts as or causes Human Errors accepted - Human Errors + 2024-05-19 + Control that monitors a Risk + Monitor Risk + Harshvardhan J. Pandit + + + - Harshvardhan J. Pandit + Compensation + Something that acts as or provides compensation - which can be monetary and financial or in other forms + accepted + 2024-08-16 + Georg P. Krog, Harshvardhan J. Pandit + 2024-04-14 - 2022-08-17 - + - - Harshvardhan J. Pandit - accepted + + - - 2022-08-17 - 0.37,xsd:decimal - High Risk (RM7x7 S:6 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High + 0.5,xsd:decimal + Moderate Severity + accepted + The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 - + Harshvardhan J. Pandit + Level where Severity is Moderate + 2022-08-18 + + + - - - Risk Concepts - Turtle serialiation + - + + + + Risk Concepts - JSON-LD serialiation - - - Risks and issues that affect or have the potential to affect society at large or specific groups in society - - - - - accepted - Societal Risk - + + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 - - + - Individual Health & Safety - accepted - - - - Harshvardhan J. Pandit + 2024-08-16 2022-08-17 - Low Risk (RM3x3 S:1 L:2) - Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low - - - - - 0.22,xsd:decimal accepted - + Something that acts as or causes Loss of Customer Confidence + Lose of Customer Confidence + + + Harshvardhan J. Pandit + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - Something that acts as or causes Unauthorised Re-Identification - 2024-08-16 - - - - Unauthorised Re-Identification - 2022-08-19 - - Georg P. Krog + accepted - - - - Something that acts as or causes Sabotage - 2024-08-16 - + - - Sabotage + 0.14,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low Harshvardhan J. Pandit - accepted + Low Risk (RM7x7 S:1 L:7) 2022-08-17 - + - - accepted + + + Something that acts as or causes Illegal Processing of Data + Illegal Data Processing + 2024-08-16 + 2022-08-17 - Harshvardhan J. Pandit - 2022-08-17 - - - 2024-08-16 - Something that acts as or causes Unauthorised Code Access - Unauthorised Code Access - - - accepted - Reputational Risk - - - - Risks and issues that affect the reputation of the organisation - + Harshvardhan J. Pandit + This concept was called "IllegalProcessingData" in DPV 2.0 + - - + + + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High - - accepted - 2022-08-17 - 2024-08-16 - Fraud - Something that acts as or causes Fraud Harshvardhan J. Pandit - + 2022-08-17 + accepted + High Risk (RM7x7 S:7 L:3) + 0.43,xsd:decimal + - - + + Very Low Risk (RM7x7 S:1 L:6) + + 0.12,xsd:decimal - Control that halts the risk source or prevents it from materialising Harshvardhan J. Pandit - Halt Source + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low + 2022-08-17 accepted - 2024-05-19 - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - + - - + + Harshvardhan J. Pandit + + 2022-08-17 + - Harshvardhan J. Pandit - 0.20,xsd:decimal - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low - - Low Risk (RM5x5 S:5 L:1) accepted - 2022-08-17 - + 2024-08-16 + + Something that acts as or causes Unauthorised Code Disclosure + Unauthorised Code Disclosure + + - + + + 0.18,xsd:decimal accepted - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate 2022-08-17 - + Low Risk (RM7x7 S:3 L:3) + Harshvardhan J. Pandit + - Harshvardhan J. Pandit - 0.32,xsd:decimal - Moderate Risk (RM5x5 S:2 L:4) - - + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low + - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - - - - Primer for Data Privacy Vocabulary - - - - Blackmail + - - Harshvardhan J. Pandit - - accepted - 2022-08-17 - Something that acts as or causes Blackmail - 2024-08-16 - + Integrity Incident + + + Incident where the integrity of information or system has been affected + 2024-05-19 - + + 2022-08-17 - + - Consequence Control + Something that acts as or causes Confidentiality Breach + + accepted + 2024-08-16 + Confidentiality Breach - Risk Mitigation Measure that controls the Consequences Harshvardhan J. Pandit - accepted - 2024-05-19 - + + - - 2022-08-17 - Moderate Risk (RM7x7 S:6 L:2) + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + https://www.iso.org/standard/75281.html + + ISO/IEC 27005:2018 + + - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate - Harshvardhan J. Pandit - 0.24,xsd:decimal - accepted - - - - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - High Risk (RM7x7 S:4 L:5) - - - + Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High Harshvardhan J. Pandit - accepted 2022-08-17 - 0.41,xsd:decimal - + High Risk (RM3x3 S:3 L:3) + 0.99,xsd:decimal + - - 2022-08-17 - 2024-08-16 - Something that acts as or causes Unauthorised Information Disclosure + + + + Risk Concepts - Turtle serialiation + + + + + + 2024-02-14 - Unauthorised Information Disclosure + The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing + Harshvardhan J. Pandit + - - - Harshvardhan J. Pandit + Incident Suspected accepted - + - + + 2024-08-16 - - Something that acts as or causes System Intrusion - 2024-08-16 - System Intrusion + + 2022-08-17 accepted Harshvardhan J. Pandit - 2022-08-17 + Something that acts as or causes Extorsion + Extorsion + - - Something that acts as or causes Equipment Malfunction - Equipment Malfunction - Here equipment refers to physical equipment - Harshvardhan J. Pandit + + A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence accepted - + + Incident Handling Report - 2022-08-17 - - 2024-08-16 - + 2024-05-19 - - + + ISO/IEC 27005:2018 + + https://www.iso.org/standard/75281.html + + + Something that acts as or causes Discrimination + 2022-08-19 + 2024-08-16 + - Harshvardhan J. Pandit - 0.80,xsd:decimal - 2022-08-17 - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High accepted - Very High Risk (RM5x5 S:4 L:5) - + Discrimination + Georg P. Krog + - + + accepted - - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - + Something that involves or causes judicial penalties to be paid + Judicial Penalty + - - + + accepted + + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High - 0.9,xsd:decimal + High Risk (RM7x7 S:4 L:4) + 2022-08-17 + Harshvardhan J. Pandit + 0.33,xsd:decimal + + + + + + + 0.08,xsd:decimal + 2022-08-17 + Very Low Risk (RM5x5 S:2 L:1) + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low accepted - Very High Severity + Harshvardhan J. Pandit - 2022-08-18 - Level where Severity is Very High - The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 - - + - - - Risk Concepts - RDF/XML serialiation - - - - + + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 - - The incident is ongoing i.e. still active - + + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate + 0.24,xsd:decimal + accepted + - Incident Ongoing - accepted - 2024-02-14 Harshvardhan J. Pandit - + Moderate Risk (RM7x7 S:3 L:4) + 2022-08-17 + - + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - - - - - + Harshvardhan J. Pandit - Something that acts as or causes Unauthorised Data Access 2022-08-17 - Unauthorised Data Access - 2024-08-16 + + + + 0.24,xsd:decimal accepted - + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate + Moderate Risk (RM5x5 S:2 L:3) + - - + + Something that acts as or causes an attack on security with the aim of undermining it + + - accepted - Georg P. Krog, Harshvardhan J. Pandit - This concept was called "LimitationOfRights" in DPV 2.0 - Something that acts as or causes Limitation of Rights - Limitation of Rights - 2022-08-18 - 2024-08-16 - + Security Attack + + + + - - 2022-08-17 - Low Risk (RM7x7 S:7 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low + + Very High Risk (RM7x7 S:4 L:7) + Harshvardhan J. Pandit - 0.14,xsd:decimal - + - + 0.57,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High + 2022-08-17 accepted - - + + - 0.31,xsd:decimal - 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High - accepted - High Risk (RM7x7 S:3 L:5) + 0.49,xsd:decimal + accepted + 2022-08-17 + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High + Very High Risk (RM7x7 S:6 L:4) Harshvardhan J. Pandit - + + accepted - + + + 2024-05-19 + Monitor Consequence Harshvardhan J. Pandit - 2022-08-18 - 5 Likelihood Levels + Control that monitors a Risk Consequence + + + + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 + + + 2024-02-14 + + + + Risk source event which causes Risk + Threat accepted - Scale with 5 Likelihood Levels from Very High to Very Low - - - 0.24,xsd:decimal - + + Here system refers to both hardware and software systems + 2024-08-16 + + + + 2022-08-17 accepted - Moderate Risk (RM7x7 S:3 L:4) + + + Harshvardhan J. Pandit + System Failure + Something that acts as or causes System Failure + + + + + Something that acts as or causes Coercion + + Harshvardhan J. Pandit 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate - + - - - - Harshvardhan J. Pandit + 2024-08-16 + Coercion accepted + + + + + - - 2022-08-17 - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate - Moderate Risk (RM5x5 S:2 L:3) - 0.24,xsd:decimal + accepted + Incident Concluded + 2024-02-14 + Harshvardhan J. Pandit + The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring - + - + + 2022-08-17 + + + + accepted + 0.73,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High - High Risk (RM7x7 S:4 L:4) - 0.33,xsd:decimal + Harshvardhan J. Pandit + Extremely High Risk (RM7x7 S:6 L:6) + + + + 2024-08-16 - + accepted - 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High + Something that acts as or causes Terrorism + Terrorism + Harshvardhan J. Pandit - + 2022-08-17 + + - - Incident Identifier - - Identifier associated with an incident + + 2022-08-18 + + Scale with 3 Likelihood Levels from High to Low accepted - 2024-05-19 - - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + + Harshvardhan J. Pandit + 3 Likelihood Levels + - - 2024-08-16 + + Harshvardhan J. Pandit + Very Low Risk (RM5x5 S:1 L:3) + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low + 0.12,xsd:decimal 2022-08-17 - Phishing Scam - Something that acts as or causes Phishing Scam - + - - - Harshvardhan J. Pandit + accepted - + - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + + 2024-02-14 + + caused by threat + + Indicates the cause of associated context (subject) was the indicated threat (object) + + + + accepted - - Security Breach + + + + Risk Concepts - RDF/XML serialiation + + + + + + 2024-05-19 - - Harshvardhan J. Pandit - 2022-08-17 - Something that acts as or causes Security Breach - 2024-08-16 + A report describing the detection of a Incident + + Incident Detection Report accepted - - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 - - Control that modifies risk - Risk Control + + accepted + 0.24,xsd:decimal + Moderate Risk (RM5x5 S:3 L:2) + Harshvardhan J. Pandit + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate + + 2022-08-17 - accepted - 2024-05-19 - - + - + + - - + The state where an incident was almost successful in taking place i.e. "it came very close" accepted - + 2024-02-14 + Incident Near Miss + + Harshvardhan J. Pandit + - - https://www.iso.org/standard/75281.html + + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - - + + accepted + + 2024-02-14 + Source of threat event, including both agent and non-agent sources + - - Financial Loss - - Harshvardhan J. Pandit - accepted - 2024-08-16 - 2022-08-17 - Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity - + Threat Source - - 0.25,xsd:decimal - 2022-08-18 - Low Likelihood + + 0.29,xsd:decimal - + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate + - The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 Harshvardhan J. Pandit + 2022-08-17 + Moderate Risk (RM7x7 S:7 L:2) accepted - Level where Likelihood is Low - - - + - - + + 0.12,xsd:decimal + - accepted - Internal Security Threat - Concepts associated with security threats and issues that originate within the organisation - - - - accepted - - - - 2022-08-17 - Something that acts as or causes a compromised account that is then used by the compromiser Harshvardhan J. Pandit - 2024-08-16 - Compromise Account - - - + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low + 2022-08-17 + Very Low Risk (RM7x7 S:6 L:1) + accepted + - - Something that acts as or causes Malware Attack + + Something that acts as or causes Unauthorised Code Access + 2024-08-16 - - - Malware Attack - accepted + 2022-08-17 + accepted + Unauthorised Code Access + Harshvardhan J. Pandit - 2022-08-17 + + - - 2024-08-16 + - Something that acts as or causes Unwanted Code Deletion - Unwanted Code Deletion + Scale with 7 Severity Levels from Extremely High to Extremely Low + 7 Severity Levels Harshvardhan J. Pandit - accepted - + - 2022-08-17 - - + 2022-08-18 + accepted + - - + + - Something that acts as or causes Loss of Trust - - - Lose of Trust + System Malfunction Harshvardhan J. Pandit - 2022-08-17 + Here system refers to both hardware and software systems accepted 2024-08-16 - - - - - - Risk Concepts - N3 serialiation - - - - - - Harshvardhan J. Pandit - accepted + 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High - 0.43,xsd:decimal - - - - High Risk (RM7x7 S:7 L:3) - + Something that acts as or causes System Malfunction + + - - + - + - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High - Very High Risk (RM5x5 S:5 L:5) - 2022-08-17 - 0.99,xsd:decimal - Harshvardhan J. Pandit accepted - + Societal Risk + Risks and issues that affect or have the potential to affect society at large or specific groups in society + + - - Lose of Reputation - Harshvardhan J. Pandit - + + - Something that acts as or causes Loss of Reputation - - - 2022-08-17 + Identification Control accepted - 2024-08-16 - + + Control to identify characteristics of event + 2024-05-19 + - + Harshvardhan J. Pandit + + - - 2022-08-17 - Low Risk (RM7x7 S:2 L:4) - - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low accepted - 0.16,xsd:decimal - + 2024-02-14 + The incident has halted or paused with a high likelihood of resuming or recurring + Incident Halted + - - Harshvardhan J. Pandit + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + - - The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 - 0.5,xsd:decimal - Level where Likelihood is Moderate - 2022-08-18 + Harshvardhan J. Pandit + 2022-08-17 + 0.48,xsd:decimal accepted - Moderate Likelihood - - - + High Risk (RM5x5 S:4 L:3) + - + + Harshvardhan J. Pandit - accepted + 2024-05-19 + - - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - 0.06,xsd:decimal - Extremely Low Risk (RM7x7 S:3 L:1) - 2022-08-17 - - + Control that changes Consequence + Change Consequence + accepted + - - + + 2024-05-19 - + + Control that modifies risk + accepted - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - 2022-08-17 - Harshvardhan J. Pandit - Moderate Risk (RM5x5 S:4 L:2) - 0.32,xsd:decimal - - - - 2022-08-17 + Risk Control + + 2024-08-16 - accepted - Harshvardhan J. Pandit - Something that acts as or causes Physical Assault - - Physical Assault - - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - + 2024-04-14 + accepted + Georg P. Krog, Harshvardhan J. Pandit + Payment + + Something that acts as or provides payment e.g. to access a service or purchase resources + - - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate - Harshvardhan J. Pandit - + - Moderate Risk (RM7x7 S:2 L:6) - 0.24,xsd:decimal - accepted - 2022-08-17 - + + 2024-02-14 + Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk + + Vulnerability - - + + - Control that changes Impact - Change Impact accepted - 2024-05-19 + Very High Likelihood + 2022-08-18 + 0.9,xsd:decimal Harshvardhan J. Pandit - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - + Level where Likelihood is Very High + The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 + + - - - - Indicates the threat (subject) exploits the indicated vulnerability (object) - - + + Harshvardhan J. Pandit + + + accepted + Incident Mitigated 2024-02-14 - exploits vulnerability - - + The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring + - + - + - 2024-08-16 - Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques - Harshvardhan J. Pandit - 2022-08-17 + The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 accepted - Brute Force Authorisations - - + 0.1,xsd:decimal + Very Low Likelihood + Harshvardhan J. Pandit + 2022-08-18 + Level where Likelihood is Very Low + + - + - accepted - Risk Mitigation Measure that shares Risk e.g. amongst stakeholders - Harshvardhan J. Pandit 2024-05-19 - Share Risk + Incident Assessment Report + A report describing the assessment of an incident in terms of its effects or impacts + - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + 2022-08-17 + 0.36,xsd:decimal + + + + Moderate Risk (RM5x5 S:3 L:3) + accepted + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate + + Harshvardhan J. Pandit + - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + + + + Status associated with an incident + accepted + 2024-02-14 + + Incident Status + Harshvardhan J. Pandit + + - - Societal Health & Safety + accepted - + + System Intrusion + - - - - This concept was called "HarmfulSpeech" in DPV 2.0 2022-08-17 - Something that acts as or causes Harmful Speech 2024-08-16 - accepted + Harshvardhan J. Pandit + Something that acts as or causes System Intrusion + + + + + + + Concepts associated with security threats that are likely to originate externally - Exposure to Harmful Speech + accepted + + External Security Threat + + + + accepted + + + + Low Risk (RM7x7 S:2 L:4) Harshvardhan J. Pandit - - + 0.16,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low + 2022-08-17 + - - 2024-04-14 - Georg P. Krog, Harshvardhan J. Pandit - DGA 2.10 - modified - + + + accepted - Fee - Something that acts as or provides fees e.g. for using a service - 2024-08-16 - + + - - Harshvardhan J. Pandit - accepted - 2024-05-19 + + Unauthorised Activity - + - Monitor Risk Source - Control that monitors a Risk Source - + accepted + Something that acts as or causes Unauthorised Activity + + + + - - 2022-08-18 - + + + 2022-08-17 + accepted + Lose of Trust + Something that acts as or causes Loss of Trust + 2024-08-16 Harshvardhan J. Pandit - Scale with 5 Severity Levels from Very High to Very Low - accepted - 5 Severity Levels - + + - - Something that acts as or causes Scam - 2024-08-16 - accepted - 2022-08-17 - + + - Harshvardhan J. Pandit - Scam + 2022-08-18 + accepted + Scale with 7 Risk Levels from Extremely High to Extremely Low - - - - - ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html - - - - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - ENISA Threat Landscape for Ransomware Attacks 2022 + Harshvardhan J. Pandit + 7 Risk Levels + - - + + - Control to recover from event - Recovery Control - accepted + Privacy - 2024-05-19 - - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + accepted + - - Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High - Harshvardhan J. Pandit + + 2022-08-17 accepted - + + Harshvardhan J. Pandit + Moderate Risk (RM3x3 S:1 L:3) + Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate + - 2022-08-17 - 0.99,xsd:decimal - - High Risk (RM3x3 S:3 L:3) + 0.33,xsd:decimal - + - 0.02,xsd:decimal - Extremely Low Risk (RM7x7 S:1 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low + Risk Matrix 3x3 Harshvardhan J. Pandit - accepted 2022-08-17 - + accepted + A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types + - + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + ENISA Reference Incident Classification Taxonomy 2018 - + - 0.49,xsd:decimal - 2022-08-17 - Very High Risk (RM7x7 S:4 L:6) - accepted + The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 - + + Extremely Low Risk + 0.01,xsd:decimal + 2022-08-18 + accepted Harshvardhan J. Pandit - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High - + Level where Risk is Extremely Low + - - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - ENISA Threat Taxonomy 2016 - + + Control that halts the risk source or prevents it from materialising + + Harshvardhan J. Pandit + + + + 2024-05-19 + Halt Source + accepted + - + + 2024-08-16 - accepted - - Something that acts as or causes Account Credentials to be compromised - Compromise Account Credentials + Violation of Contractual Obligation - Harshvardhan J. Pandit + This concept was called "ViolationContractualObligations" in DPV 2.0 + Something that acts as or causes Violation of Contractual Obligations 2022-08-17 - + Harshvardhan J. Pandit + modified + - - 2024-08-16 - 2022-08-17 - + Harshvardhan J. Pandit + Extremely Low Risk (RM7x7 S:1 L:3) + + + accepted - Extorsion - + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low + 0.06,xsd:decimal + + 2022-08-17 + + + + + Unauthorised Resource Use + accepted + Something that acts as or causes Unauthorised Resource Use - Something that acts as or causes Extorsion + Harshvardhan J. Pandit + + 2024-08-16 + 2022-08-17 + - - Risk source event which causes Risk - - accepted - - 2024-02-14 + + Harshvardhan J. Pandit + Very High Risk (RM7x7 S:4 L:6) + - Threat - - + 0.49,xsd:decimal accepted - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low - 0.10,xsd:decimal - - - 2022-08-17 - Very Low Risk (RM7x7 S:5 L:1) - Harshvardhan J. Pandit + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High - - - accepted - The criteria for what is considered material damage is based in jurisdictional laws and norms + + https://www.iso.org/standard/75281.html + + ISO/IEC 27005:2018 + + - + + A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types + Harshvardhan J. Pandit - 2022-03-30 - Something that acts as or causes Material Damage - 2024-08-16 - Material Damage - + Risk Matrix 7x7 + 2022-08-17 + accepted + - - Risk Analysis + + Extremely Low Severity + Harshvardhan J. Pandit - + + + + The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 + Level where Severity is Extremely Low accepted + 0.01,xsd:decimal + 2022-08-18 + + + + Georg P. Krog, Harshvardhan J. Pandit + - Harshvardhan J. Pandit - A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures - + This concept was called "PreventExercisingOfRights" in DPV 2.0 + + Something that acts as or causes Prevent Exercising of Rights 2022-08-18 + Prevent Exercising of Rights + accepted + 2024-08-16 + - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - Moderate Risk (RM7x7 S:5 L:3) + - Harshvardhan J. Pandit - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - 0.31,xsd:decimal 2022-08-17 + 0.24,xsd:decimal accepted + + Harshvardhan J. Pandit + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate + Moderate Risk (RM7x7 S:2 L:6) - - accepted - + + + + Primer for Data Privacy Vocabulary + + + + + + Confidentiality Incident - 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low - Harshvardhan J. Pandit - 0.08,xsd:decimal - - Extremely Low Risk (RM7x7 S:4 L:1) - - - - Scale with 7 Risk Levels from Extremely High to Extremely Low + Incident where the confidentiality of information or system has been affected + + 2024-05-19 - 7 Risk Levels - Harshvardhan J. Pandit accepted - - - - 2022-08-18 - - - - - accepted - Indicates the cause of associated context (subject) was the indicated threat (object) - + - - 2024-02-14 - caused by threat - - + Harshvardhan J. Pandit 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate - Moderate Risk (RM7x7 S:2 L:7) - Harshvardhan J. Pandit - 0.29,xsd:decimal - + Very Low Risk (RM7x7 S:1 L:4) accepted + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low + 0.08,xsd:decimal - - Low Risk (RM5x5 S:4 L:1) - - - - 2022-08-17 - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low + + Unauthorised System Modification + Harshvardhan J. Pandit - 0.16,xsd:decimal - accepted - - - - - 2024-05-19 - Incident Assessment Report - + 2022-08-17 + - A report describing the assessment of an incident in terms of its effects or impacts + Something that acts as or causes Unauthorised System Modification + 2024-08-16 accepted + + - + 2022-08-17 - + - Harshvardhan J. Pandit - 0.57,xsd:decimal - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High - Very High Risk (RM7x7 S:4 L:7) + Harshvardhan J. Pandit accepted - + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High + Very High Risk (RM5x5 S:4 L:5) + 0.80,xsd:decimal + - - - ENISa Trust Services Security Incidents 2021 - https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 + + + + + Examples for Data Privacy Vocabulary + + - - 2024-08-16 + + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High 2022-08-17 - Violating Ethics Code - - This concept was called "ViolationEthicalCode" in DPV 2.0 - Harshvardhan J. Pandit - modified - Something that acts as or causes Violation of Ethics Code - + - - - - - Harshvardhan J. Pandit + High Risk (RM5x5 S:5 L:3) accepted - - - - 0.16,xsd:decimal - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - Low Risk (RM5x5 S:2 L:2) - 2022-08-17 + Harshvardhan J. Pandit + 0.60,xsd:decimal - - + + Level where Risk is Very High - accepted - 3 Risk Levels + The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 + Harshvardhan J. Pandit - Scale with 3 Risk Levels from High to Low 2022-08-18 - - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - 2022-08-17 - 0.08,xsd:decimal - Extremely Low Risk (RM7x7 S:2 L:2) + Very High Risk + 0.9,xsd:decimal accepted + + + + - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low + accepted + Very Low Risk (RM7x7 S:5 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low Harshvardhan J. Pandit + 2022-08-17 + 0.10,xsd:decimal - - 2024-05-19 - + accepted + A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated + + 2024-05-19 + + Incident Ongoing Report - - Deliberate Incident - Incident caused due to deliberate actions of a human - - Vulnerability - 2024-02-14 - Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk + + 0.06,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low + + + + Harshvardhan J. Pandit + Extremely Low Risk (RM7x7 S:3 L:1) + 2022-08-17 + accepted + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + accepted + 5 Severity Levels + + Harshvardhan J. Pandit + 2022-08-18 + - + Scale with 5 Severity Levels from Very High to Very Low + - + + The criteria for what is considered material damage is based in jurisdictional laws and norms + Something that acts as or causes Material Damage accepted - + 2024-08-16 + + 2022-03-30 + Material Damage - Intentional Misuse - Intentional Misuse - + Harshvardhan J. Pandit + - - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High + + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low - Extremely High Risk (RM7x7 S:7 L:6) + Harshvardhan J. Pandit + 2022-08-17 - Harshvardhan J. Pandit + Low Risk (RM7x7 S:2 L:5) accepted - 2022-08-17 - 0.86,xsd:decimal + 0.20,xsd:decimal - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + + https://www.iso.org/standard/72140.html + IEC 31010:2019 - - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - ENISA Threat Taxonomy 2016 + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + + + Things that cause or have the potential to impact financial resources + accepted + Financial Impact + - - 0.40,xsd:decimal + + Control that monitors another Control + Harshvardhan J. Pandit + Monitor Control + 2024-05-19 + - - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High - High Risk (RM5x5 S:5 L:2) - accepted - 2022-08-17 - + - - 2022-08-18 - + + - The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 - 0.99,xsd:decimal - Level where Risk is Extremely High - accepted - Extremely High Risk - Harshvardhan J. Pandit - + Intentional Misuse + + Intentional Misuse + - - 0.1,xsd:decimal - 2022-08-18 + + - - - Very Low Risk + 2022-08-17 + Low Risk (RM5x5 S:1 L:5) accepted - Level where Risk is Very Low + 0.20,xsd:decimal + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low + Harshvardhan J. Pandit - The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 - - + - - + + Impact to Rights + 2022-08-17 + - + + 2024-08-16 accepted - Unauthorised Activity - Something that acts as or causes Unauthorised Activity - + + Harshvardhan J. Pandit + This concept was called "ImpactToRights" in DPV 2.0 + Something that acts as or causes Impact to Rights + + - - + + Incident Status Unknown + + Harshvardhan J. Pandit + - Public Order Breach - - Harshvardhan J. Pandit accepted - 2024-08-16 - 2022-08-17 - Something that acts as or causes Public Order Breach - - + The status of a incident is unknown + 2024-02-14 + - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 - - - Operational Security Risk + + + + + + + Guides for Data Privacy Vocabulary + + accepted - + 2024-08-16 + - Risks and issues that arise during operational processes - + 2024-04-14 + Georg P. Krog, Harshvardhan J. Pandit + + Something that acts as or provides renumeration which is in monetary or financial form + Remuneration + - + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html + + + ENISA Threat Landscape for Ransomware Attacks 2022 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + Risk Concepts - N3 serialiation + + + + + + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - Harshvardhan J. Pandit - 2024-08-16 - Something that acts as or causes Unauthorised Data Disclosure - Unauthorised Data Disclosure - + + https://www.iso.org/standard/75281.html + + ISO/IEC 27005:2018 + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + 2024-02-14 + + + has vulnerability + + + + accepted + Indicates the associated context (subject) has indicated vulnerability (object) + + + + - - + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate accepted 2022-08-17 - + Harshvardhan J. Pandit + 0.32,xsd:decimal + Moderate Risk (RM5x5 S:2 L:4) + - - Control that removes Impact i.e. prevents it from materialising - accepted + + + Risk Concepts - HTML serialiation + + + + + + + Incident caused due to accidental actions arising from human or human-controlled situations + Accidental Incident + + 2024-05-19 + + + accepted + + - Harshvardhan J. Pandit - Remove Impact + 2024-05-19 + accepted + Recovery Control - + Control to recover from event + - + + 2024-02-14 + Assessment of risk involving its identification, analysis, and evaluation + Risk Assessment + - accepted - 2022-08-17 - 0.16,xsd:decimal - - Harshvardhan J. Pandit - Low Risk (RM5x5 S:1 L:4) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low - - - - ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html - - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - ENISA Methodology for Sectoral Cybersecurity Assessments - - - - ENISA Threat Landscape for Ransomware Attacks 2022 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + accepted + ISO 31073:2022 Risk management vocabulary - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + + https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 + ENISA Threat Landscape 2021 - + + High Risk (RM7x7 S:5 L:4) - Harshvardhan J. Pandit - accepted - High Risk (RM5x5 S:2 L:5) - 0.40,xsd:decimal + Harshvardhan J. Pandit 2022-08-17 - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High - - - - + 0.41,xsd:decimal accepted - Incident Report - - - - 2024-05-19 - Documented information about an incident, its handling, assessments,and notifications - - - - Risk Concepts - HTML serialiation - - - - + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + - + + https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 + ENISA Threat Landscape for Ransomware Attacks 2022 - + - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + https://www.iso.org/standard/72140.html + IEC 31010:2019 - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 + + Risk Matrix 5x5 + + + + accepted + Harshvardhan J. Pandit + A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types + 2022-08-17 + + - + + Something that acts as or causes Child Violence + 2024-08-16 + + + + accepted + + This concept was called "ChildViolence" in DPV 2.0 - Risks and issues that have their basis in legal requirements and enforcement - Legal Risk + Harshvardhan J. Pandit + Violence against children + 2022-08-17 + + + accepted - + Physical Harm + + - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - + + accepted + Risks and issues that have their basis in legal requirements and enforcement + + + + + Legal Risk + - - ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - - Harshvardhan J. Pandit - accepted + - - 2024-05-19 - Monitor Risk - Control that monitors a Risk - - - + + Deliberate Incident + Incident caused due to deliberate actions of a human - Integrity Incident + accepted + + + - Incident where the integrity of information or system has been affected - accepted - 2024-05-19 + + Harshvardhan J. Pandit + This concept was called "ViolationRegulatoryObligations" in DPV 2.0 + modified + Violation of Legal Obligations + Something that acts as or causes Violation of Legal Obligations + 2024-08-16 + 2022-08-17 + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 - - - 2022-08-18 - 0.99,xsd:decimal - + + 2022-08-17 + Harshvardhan J. Pandit + - Harshvardhan J. Pandit + 0.99,xsd:decimal + Extremely High Risk (RM7x7 S:7 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High accepted - The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 - Extremely High Severity - Level where Severity is Extremely High - + - - Incident Ongoing Report - - accepted - - - - 2024-05-19 - A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - accepted - 2024-05-19 + + 2022-08-17 - + + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High + accepted + High Risk (RM7x7 S:3 L:5) + 0.31,xsd:decimal - Monitor Consequence - Control that monitors a Risk Consequence Harshvardhan J. Pandit - + - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ENISA Methodology for Sectoral Cybersecurity Assessments - + + Harshvardhan J. Pandit - High Risk (RM5x5 S:5 L:3) + The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring + - - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High - - 0.60,xsd:decimal + Incident Terminated accepted - 2022-08-17 - + 2024-02-14 + - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + + Cross-Border Incident + + + 2024-05-19 + Incident involving cross-border or multiple jurisdictions + accepted + + - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - Privacy accepted - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - + Operational Security Risk + Risks and issues that arise during operational processes + - - + + + - Harshvardhan J. Pandit - A register recording incidentes, their reports, notifications, and other related activities accepted + Environmental Incident + 2024-05-19 + Incident caused due to environmental factors outside human controls + + + accepted + - Incident Register + User Risks + Concepts associated with risks that arise due to User or Human use + + - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + https://www.iso.org/standard/75281.html + + ISO/IEC 27005:2018 + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + ENISA Threat Taxonomy 2016 + + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + ENISA Reference Incident Classification Taxonomy 2018 + + + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + ENISA Threat Taxonomy 2016 + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + + ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + - ENISA Reference Incident Classification Taxonomy 2018 + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html + + ISO/IEC 27005:2018 + + https://www.iso.org/standard/75281.html - + - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html diff --git a/2.1-dev/risk/risk-owl.ttl b/2.1-dev/risk/risk-owl.ttl index f2342f89c..b6e848bba 100644 --- a/2.1-dev/risk/risk-owl.ttl +++ b/2.1-dev/risk/risk-owl.ttl @@ -143,7 +143,9 @@ risk-owl:AuthorisationFailure a rdfs:Class, schema:name "ENISa Trust Services Security Incidents 2021" ; schema:url "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Authorisation Failure"@en ; skos:prefLabel "Authorisation Failure"@en . @@ -152,7 +154,8 @@ risk-owl:AvailabilityBreach a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:DataBreach ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:DataBreach ; sw:term_status "accepted"@en . risk-owl:AvailabilityIncident a rdfs:Class, @@ -197,7 +200,8 @@ risk-owl:Blackmail a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Blackmail"@en ; skos:prefLabel "Blackmail"@en . @@ -212,7 +216,9 @@ risk-owl:BruteForceAuthorisations a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; skos:prefLabel "Brute Force Authorisations"@en . @@ -249,7 +255,8 @@ risk-owl:Coercion a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Coercion"@en ; skos:prefLabel "Coercion"@en . @@ -270,7 +277,8 @@ risk-owl:ComponentFailure a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Component Failure"@en ; skos:prefLabel "Component Failure"@en ; @@ -280,7 +288,8 @@ risk-owl:ComponentMalfunction a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Component Malfunction"@en ; skos:prefLabel "Component Malfunction"@en ; @@ -296,7 +305,10 @@ risk-owl:CompromiseAccount a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ; skos:prefLabel "Compromise Account"@en . @@ -311,7 +323,8 @@ risk-owl:CompromiseAccountCredentials a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ; skos:prefLabel "Compromise Account Credentials"@en . @@ -326,7 +339,8 @@ risk-owl:ConfidentialityBreach a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:DataBreach ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:DataBreach ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Confidentiality Breach"@en ; skos:prefLabel "Confidentiality Breach"@en . @@ -395,7 +409,8 @@ risk-owl:Cryptojacking a rdfs:Class, schema:name "ENISA Threat Landscape 2021" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Cryptojacking"@en ; skos:prefLabel "Cryptojacking"@en . @@ -424,7 +439,10 @@ risk-owl:DataBreach a rdfs:Class, vann:example dex-owl:E0069, dex-owl:E0071 ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SecurityBreach ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:SecurityBreach ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Data Breach"@en ; skos:prefLabel "Data Breach"@en . @@ -439,7 +457,8 @@ risk-owl:DataCorruption a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:IntegrityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Corruption of Data"@en ; skos:prefLabel "Data Corruption"@en ; @@ -461,13 +480,11 @@ risk-owl:DenialServiceAttack a rdfs:Class, dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ], - [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ; skos:prefLabel "Denial of Service Attack (DoS)"@en . @@ -516,7 +533,8 @@ risk-owl:DistributedDenialServiceAttack a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ; skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en . @@ -549,7 +567,8 @@ risk-owl:EquipmentFailure a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Equipment Failure"@en ; skos:prefLabel "Equipment Failure"@en ; @@ -565,7 +584,8 @@ risk-owl:EquipmentMalfunction a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Equipment Malfunction"@en ; skos:prefLabel "Equipment Malfunction"@en ; @@ -621,7 +641,8 @@ risk-owl:Extorsion a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Extorsion"@en ; skos:prefLabel "Extorsion"@en . @@ -751,7 +772,8 @@ risk-owl:Fraud a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Fraud"@en ; skos:prefLabel "Fraud"@en . @@ -860,7 +882,8 @@ risk-owl:IdentityFraud a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Identity Fraud"@en ; skos:prefLabel "Identity Fraud"@en . @@ -875,7 +898,8 @@ risk-owl:IdentityTheft a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Identity Theft"@en ; skos:prefLabel "Identity Theft"@en . @@ -1175,7 +1199,8 @@ risk-owl:IntegrityBreach a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:DataBreach ; + rdfs:subClassOf risk-owl:DataBreach, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en . risk-owl:IntegrityIncident a rdfs:Class, @@ -1206,21 +1231,13 @@ risk-owl:InterceptCommunications a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Interception of Communications"@en ; skos:prefLabel "Intercept Communications"@en ; skos:scopeNote "This concept was called \"InterceptionCommunications\" in DPV 2.0"@en . -risk-owl:InternalSecurityThreat a rdfs:Class, - owl:Class, - dpv-owl:RiskConcept ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:RiskConcept ; - sw:term_status "accepted"@en ; - skos:definition "Concepts associated with security threats and issues that originate within the organisation"@en ; - skos:prefLabel "Internal Security Threat"@en . - risk-owl:JudicialCosts a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; @@ -1408,7 +1425,10 @@ risk-owl:MaliciousCodeAttack a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Malicious Code Attack"@en ; skos:prefLabel "Malicious Code Attack"@en . @@ -1423,7 +1443,10 @@ risk-owl:MalwareAttack a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Malware Attack"@en ; skos:prefLabel "Malware Attack"@en . @@ -1635,7 +1658,8 @@ risk-owl:PhishingScam a rdfs:Class, schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Phishing Scam"@en ; skos:prefLabel "Phishing Scam"@en . @@ -2746,7 +2770,8 @@ risk-owl:Reidentification a rdfs:Class, dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Re-identification"@en ; skos:prefLabel "Re-identification"@en ; @@ -2994,7 +3019,9 @@ risk-owl:Sabotage a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Sabotage"@en ; skos:prefLabel "Sabotage"@en . @@ -3009,7 +3036,8 @@ risk-owl:Scam a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Scam"@en ; skos:prefLabel "Scam"@en . @@ -3018,7 +3046,10 @@ risk-owl:SecurityAttack a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ; skos:prefLabel "Security Attack"@en . @@ -3033,7 +3064,10 @@ risk-owl:SecurityBreach a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Security Breach"@en ; skos:prefLabel "Security Breach"@en . @@ -3117,7 +3151,9 @@ risk-owl:Spoofing a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat, + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept, risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Spoofing"@en ; @@ -3133,7 +3169,8 @@ risk-owl:SystemFailure a rdfs:Class, schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes System Failure"@en ; skos:prefLabel "System Failure"@en ; @@ -3149,7 +3186,10 @@ risk-owl:SystemIntrusion a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes System Intrusion"@en ; skos:prefLabel "System Intrusion"@en . @@ -3164,7 +3204,8 @@ risk-owl:SystemMalfunction a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes System Malfunction"@en ; skos:prefLabel "System Malfunction"@en ; @@ -3213,7 +3254,10 @@ risk-owl:UnauthorisedAccesstoPremises a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ; skos:prefLabel "Unauthorised Access to Premises"@en . @@ -3222,7 +3266,10 @@ risk-owl:UnauthorisedActivity a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Activity"@en ; skos:prefLabel "Unauthorised Activity"@en . @@ -3237,7 +3284,9 @@ risk-owl:UnauthorisedCodeAccess a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Code Access"@en ; skos:prefLabel "Unauthorised Code Access"@en . @@ -3252,7 +3301,8 @@ risk-owl:UnauthorisedCodeDisclosure a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ; skos:prefLabel "Unauthorised Code Disclosure"@en . @@ -3267,7 +3317,8 @@ risk-owl:UnauthorisedCodeModification a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ; skos:prefLabel "Unauthorised Code Modification"@en . @@ -3282,7 +3333,8 @@ risk-owl:UnauthorisedDataAccess a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Data Access"@en ; skos:prefLabel "Unauthorised Data Access"@en . @@ -3297,7 +3349,8 @@ risk-owl:UnauthorisedDataDisclosure a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ; skos:prefLabel "Unauthorised Data Disclosure"@en . @@ -3312,7 +3365,8 @@ risk-owl:UnauthorisedDataModification a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ; skos:prefLabel "Unauthorised Data Modification"@en . @@ -3327,7 +3381,8 @@ risk-owl:UnauthorisedInformationDisclosure a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ; skos:prefLabel "Unauthorised Information Disclosure"@en . @@ -3339,7 +3394,8 @@ risk-owl:UnauthorisedReidentification a rdfs:Class, dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ; skos:prefLabel "Unauthorised Re-Identification"@en . @@ -3354,7 +3410,8 @@ risk-owl:UnauthorisedResourceUse a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ; skos:prefLabel "Unauthorised Resource Use"@en . @@ -3369,7 +3426,9 @@ risk-owl:UnauthorisedSystemAccess a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised System Access"@en ; skos:prefLabel "Unauthorised System Access"@en . @@ -3384,7 +3443,8 @@ risk-owl:UnauthorisedSystemModification a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised System Modification"@en ; skos:prefLabel "Unauthorised System Modification"@en . @@ -3399,7 +3459,9 @@ risk-owl:UnwantedCodeDeletion a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ; skos:prefLabel "Unwanted Code Deletion"@en . @@ -3414,7 +3476,9 @@ risk-owl:UnwantedDataDeletion a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ; skos:prefLabel "Unwanted Data Deletion"@en . @@ -3429,7 +3493,8 @@ risk-owl:UnwantedDisclosureData a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ; skos:prefLabel "Unwanted Disclosure of Data"@en . @@ -3641,21 +3706,6 @@ risk-owl:Vulnerability a rdfs:Class, skos:definition "Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk"@en ; skos:prefLabel "Vulnerability"@en . -risk-owl:VulnerabilityCreated a rdfs:Class, - owl:Class, - dpv-owl:RiskConcept ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:modified "2024-08-16"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:InternalSecurityThreat ; - sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Vulnerability Created"@en ; - skos:prefLabel "Vulnerability Created"@en . - risk-owl:causedByThreat a rdf:Property, owl:ObjectProperty ; dcam:rangeIncludes risk-owl:Threat ; diff --git a/2.1-dev/risk/risk.csv b/2.1-dev/risk/risk.csv index 96ed050f9..eaeac3060 100644 --- a/2.1-dev/risk/risk.csv +++ b/2.1-dev/risk/risk.csv @@ -10,44 +10,44 @@ term,type,iri,label,definition,dpvtype,subclassof,hasbroader,scopenote,created,m 7SeverityLevels,class,https://w3id.org/dpv/risk#7SeverityLevels,7 Severity Levels,Scale with 7 Severity Levels from Extremely High to Extremely Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv#Severity,,2022-08-18,,risk,https://w3id.org/dpv/risk AccidentalIncident,class,https://w3id.org/dpv/risk#AccidentalIncident,Accidental Incident,Incident caused due to accidental actions arising from human or human-controlled situations,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk AccidentalMisuse,class,https://w3id.org/dpv/risk#AccidentalMisuse,Accidental Misuse,Accidental Misuse,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,,,risk,https://w3id.org/dpv/risk -AuthorisationFailure,class,https://w3id.org/dpv/risk#AuthorisationFailure,Authorisation Failure,Something that acts as or causes Authorisation Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +AuthorisationFailure,class,https://w3id.org/dpv/risk#AuthorisationFailure,Authorisation Failure,Something that acts as or causes Authorisation Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk AvailabilityIncident,class,https://w3id.org/dpv/risk#AvailabilityIncident,Availability Incident,Incident where the availability of information or system has been affected,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk AvoidSource,class,https://w3id.org/dpv/risk#AvoidSource,Avoid Source,Control that avoids the risk source,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#SourceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk Benefit,class,https://w3id.org/dpv/risk#Benefit,Benefit,Something that acts as or causes benefits,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2022-03-23,2024-08-16,risk,https://w3id.org/dpv/risk -Blackmail,class,https://w3id.org/dpv/risk#Blackmail,Blackmail,Something that acts as or causes Blackmail,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -BruteForceAuthorisations,class,https://w3id.org/dpv/risk#BruteForceAuthorisations,Brute Force Authorisations,Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Blackmail,class,https://w3id.org/dpv/risk#Blackmail,Blackmail,Something that acts as or causes Blackmail,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +BruteForceAuthorisations,class,https://w3id.org/dpv/risk#BruteForceAuthorisations,Brute Force Authorisations,Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ChangeConsequence,class,https://w3id.org/dpv/risk#ChangeConsequence,Change Consequence,Control that changes Consequence,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ConsequenceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk ChangeImpact,class,https://w3id.org/dpv/risk#ChangeImpact,Change Impact,Control that changes Impact,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ImpactControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -Coercion,class,https://w3id.org/dpv/risk#Coercion,Coercion,Something that acts as or causes Coercion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Coercion,class,https://w3id.org/dpv/risk#Coercion,Coercion,Something that acts as or causes Coercion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk Compensation,class,https://w3id.org/dpv/risk#Compensation,Compensation,Something that acts as or provides compensation - which can be monetary and financial or in other forms,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk -ComponentFailure,class,https://w3id.org/dpv/risk#ComponentFailure,Component Failure,Something that acts as or causes Component Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk -ComponentMalfunction,class,https://w3id.org/dpv/risk#ComponentMalfunction,Component Malfunction,Something that acts as or causes Component Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk -CompromiseAccount,class,https://w3id.org/dpv/risk#CompromiseAccount,Compromise Account,Something that acts as or causes a compromised account that is then used by the compromiser,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -CompromiseAccountCredentials,class,https://w3id.org/dpv/risk#CompromiseAccountCredentials,Compromise Account Credentials,Something that acts as or causes Account Credentials to be compromised,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -ConfidentialityBreach,class,https://w3id.org/dpv/risk#ConfidentialityBreach,Confidentiality Breach,Something that acts as or causes Confidentiality Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#DataBreach,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ComponentFailure,class,https://w3id.org/dpv/risk#ComponentFailure,Component Failure,Something that acts as or causes Component Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk +ComponentMalfunction,class,https://w3id.org/dpv/risk#ComponentMalfunction,Component Malfunction,Something that acts as or causes Component Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk +CompromiseAccount,class,https://w3id.org/dpv/risk#CompromiseAccount,Compromise Account,Something that acts as or causes a compromised account that is then used by the compromiser,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +CompromiseAccountCredentials,class,https://w3id.org/dpv/risk#CompromiseAccountCredentials,Compromise Account Credentials,Something that acts as or causes Account Credentials to be compromised,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ConfidentialityBreach,class,https://w3id.org/dpv/risk#ConfidentialityBreach,Confidentiality Breach,Something that acts as or causes Confidentiality Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#DataBreach,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ConfidentialityIncident,class,https://w3id.org/dpv/risk#ConfidentialityIncident,Confidentiality Incident,Incident where the confidentiality of information or system has been affected,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk ConsequenceControl,class,https://w3id.org/dpv/risk#ConsequenceControl,Consequence Control,Risk Mitigation Measure that controls the Consequences,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk ContainmentControl,class,https://w3id.org/dpv/risk#ContainmentControl,Containment Control,Control to contain event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk CopyrightViolation,class,https://w3id.org/dpv/risk#CopyrightViolation,Copyright Violation,Something that acts as or causes Copyright Violation,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk CrossBorderIncident,class,https://w3id.org/dpv/risk#CrossBorderIncident,Cross-Border Incident,Incident involving cross-border or multiple jurisdictions,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk -Cryptojacking,class,https://w3id.org/dpv/risk#Cryptojacking,Cryptojacking,Something that acts as or causes Cryptojacking,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Cryptojacking,class,https://w3id.org/dpv/risk#Cryptojacking,Cryptojacking,Something that acts as or causes Cryptojacking,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk Damage,class,https://w3id.org/dpv/risk#Damage,Damage,Something that acts as or causes Damage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk -DataBreach,class,https://w3id.org/dpv/risk#DataBreach,Data Breach,Something that acts as or causes Data Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SecurityBreach,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -DataCorruption,class,https://w3id.org/dpv/risk#DataCorruption,Data Corruption,Something that acts as or causes Corruption of Data,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,"This concept was called ""Corruption Data"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +DataBreach,class,https://w3id.org/dpv/risk#DataBreach,Data Breach,Something that acts as or causes Data Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#SecurityBreach,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +DataCorruption,class,https://w3id.org/dpv/risk#DataCorruption,Data Corruption,Something that acts as or causes Corruption of Data,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,"This concept was called ""Corruption Data"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk DeliberateIncident,class,https://w3id.org/dpv/risk#DeliberateIncident,Deliberate Incident,Incident caused due to deliberate actions of a human,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk -DenialServiceAttack,class,https://w3id.org/dpv/risk#DenialServiceAttack,Denial of Service Attack (DoS),Something that acts as or causes Denial of Service Attack (DoS),https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +DenialServiceAttack,class,https://w3id.org/dpv/risk#DenialServiceAttack,Denial of Service Attack (DoS),Something that acts as or causes Denial of Service Attack (DoS),https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk DetectionControl,class,https://w3id.org/dpv/risk#DetectionControl,Detection Control,Control to detect event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk Detriment,class,https://w3id.org/dpv/risk#Detriment,Detriment,Something that acts as or causes Detriment,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-03-23,2024-08-16,risk,https://w3id.org/dpv/risk Discrimination,class,https://w3id.org/dpv/risk#Discrimination,Discrimination,Something that acts as or causes Discrimination,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk -DistributedDenialServiceAttack,class,https://w3id.org/dpv/risk#DistributedDenialServiceAttack,Distributed Denial of Service Attack (DDoS),Something that acts as or causes Distributed Denial of Service Attack (DDoS),https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +DistributedDenialServiceAttack,class,https://w3id.org/dpv/risk#DistributedDenialServiceAttack,Distributed Denial of Service Attack (DDoS),Something that acts as or causes Distributed Denial of Service Attack (DDoS),https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk EnvironmentalIncident,class,https://w3id.org/dpv/risk#EnvironmentalIncident,Environmental Incident,Incident caused due to environmental factors outside human controls,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk EnvironmentalRisk,class,https://w3id.org/dpv/risk#EnvironmentalRisk,Environmental Risk,Risks and issues that have their origin in environment or can affect the environment at large,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk -EquipmentFailure,class,https://w3id.org/dpv/risk#EquipmentFailure,Equipment Failure,Something that acts as or causes Equipment Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -EquipmentMalfunction,class,https://w3id.org/dpv/risk#EquipmentMalfunction,Equipment Malfunction,Something that acts as or causes Equipment Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +EquipmentFailure,class,https://w3id.org/dpv/risk#EquipmentFailure,Equipment Failure,Something that acts as or causes Equipment Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +EquipmentMalfunction,class,https://w3id.org/dpv/risk#EquipmentMalfunction,Equipment Malfunction,Something that acts as or causes Equipment Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ErroneousSystemUse,class,https://w3id.org/dpv/risk#ErroneousSystemUse,Erroneous System Use,Something that acts as or causes Erroneous System Use,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ExposureToHarmfulSpeech,class,https://w3id.org/dpv/risk#ExposureToHarmfulSpeech,Exposure to Harmful Speech,Something that acts as or causes Harmful Speech,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""HarmfulSpeech"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ExternalSecurityThreat,class,https://w3id.org/dpv/risk#ExternalSecurityThreat,External Security Threat,Concepts associated with security threats that are likely to originate externally,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk -Extorsion,class,https://w3id.org/dpv/risk#Extorsion,Extorsion,Something that acts as or causes Extorsion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Extorsion,class,https://w3id.org/dpv/risk#Extorsion,Extorsion,Something that acts as or causes Extorsion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ExtremelyHighLikelihood,class,https://w3id.org/dpv/risk#ExtremelyHighLikelihood,Extremely High Likelihood,Level where Likelihood is Extremely High,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk ExtremelyHighRisk,class,https://w3id.org/dpv/risk#ExtremelyHighRisk,Extremely High Risk,Level where Risk is Extremely High,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#7RiskLevels,The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk ExtremelyHighSeverity,class,https://w3id.org/dpv/risk#ExtremelyHighSeverity,Extremely High Severity,Level where Severity is Extremely High,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk @@ -57,16 +57,16 @@ ExtremelyLowSeverity,class,https://w3id.org/dpv/risk#ExtremelyLowSeverity,Extrem Fee,class,https://w3id.org/dpv/risk#Fee,Fee,Something that acts as or provides fees e.g. for using a service,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk FinancialImpact,class,https://w3id.org/dpv/risk#FinancialImpact,Financial Impact,Things that cause or have the potential to impact financial resources,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk FinancialLoss,class,https://w3id.org/dpv/risk#FinancialLoss,Financial Loss,Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -Fraud,class,https://w3id.org/dpv/risk#Fraud,Fraud,Something that acts as or causes Fraud,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Fraud,class,https://w3id.org/dpv/risk#Fraud,Fraud,Something that acts as or causes Fraud,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk HaltSource,class,https://w3id.org/dpv/risk#HaltSource,Halt Source,Control that halts the risk source or prevents it from materialising,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#SourceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk Harm,class,https://w3id.org/dpv/risk#Harm,Harm,Something that acts as or causes Harm to humans,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,This concept refers to the general abstract notion of harm,2022-08-13,2024-08-16,risk,https://w3id.org/dpv/risk HighLikelihood,class,https://w3id.org/dpv/risk#HighLikelihood,High Likelihood,Level where Likelihood is High,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#3LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -HighRisk,class,https://w3id.org/dpv/risk#HighRisk,High Risk,Level where Risk is High,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#3RiskLevels;https://w3id.org/dpv/risk#7RiskLevels;https://w3id.org/dpv/risk#5RiskLevels,The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -HighSeverity,class,https://w3id.org/dpv/risk#HighSeverity,High Severity,Level where Severity is High,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#3SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +HighRisk,class,https://w3id.org/dpv/risk#HighRisk,High Risk,Level where Risk is High,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#3RiskLevels;https://w3id.org/dpv/risk#5RiskLevels;https://w3id.org/dpv/risk#7RiskLevels,The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +HighSeverity,class,https://w3id.org/dpv/risk#HighSeverity,High Severity,Level where Severity is High,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels;https://w3id.org/dpv/risk#3SeverityLevels,The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk HumanErrors,class,https://w3id.org/dpv/risk#HumanErrors,Human Errors,Something that acts as or causes Human Errors,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk IdentificationControl,class,https://w3id.org/dpv/risk#IdentificationControl,Identification Control,Control to identify characteristics of event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -IdentityFraud,class,https://w3id.org/dpv/risk#IdentityFraud,Identity Fraud,Something that acts as or causes Identity Fraud,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -IdentityTheft,class,https://w3id.org/dpv/risk#IdentityTheft,Identity Theft,Something that acts as or causes Identity Theft,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +IdentityFraud,class,https://w3id.org/dpv/risk#IdentityFraud,Identity Fraud,Something that acts as or causes Identity Fraud,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +IdentityTheft,class,https://w3id.org/dpv/risk#IdentityTheft,Identity Theft,Something that acts as or causes Identity Theft,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk IllegalDataProcessing,class,https://w3id.org/dpv/risk#IllegalDataProcessing,Illegal Data Processing,Something that acts as or causes Illegal Processing of Data,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""IllegalProcessingData"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ImpactControl,class,https://w3id.org/dpv/risk#ImpactControl,Impact Control,Risk Mitigation Measure that controls Impacts,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk Incident,class,https://w3id.org/dpv/risk#Incident,Incident,An actual or occured event,,https://w3id.org/dpv#RiskConcept,https://w3id.org/dpv#RiskConcept,Incident is realised or materialised risk,2024-02-14,2024-08-16,risk,https://w3id.org/dpv/risk @@ -97,8 +97,7 @@ IndividualRisk,class,https://w3id.org/dpv/risk#IndividualRisk,Individual Risk,Ri Injury,class,https://w3id.org/dpv/risk#Injury,Injury,Something that acts as or causes Injury,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk IntegrityIncident,class,https://w3id.org/dpv/risk#IntegrityIncident,Integrity Incident,Incident where the integrity of information or system has been affected,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk IntentionalMisuse,class,https://w3id.org/dpv/risk#IntentionalMisuse,Intentional Misuse,Intentional Misuse,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,,,risk,https://w3id.org/dpv/risk -InterceptCommunications,class,https://w3id.org/dpv/risk#InterceptCommunications,Intercept Communications,Something that acts as or causes Interception of Communications,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,"This concept was called ""InterceptionCommunications"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -InternalSecurityThreat,class,https://w3id.org/dpv/risk#InternalSecurityThreat,Internal Security Threat,Concepts associated with security threats and issues that originate within the organisation,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk +InterceptCommunications,class,https://w3id.org/dpv/risk#InterceptCommunications,Intercept Communications,Something that acts as or causes Interception of Communications,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,"This concept was called ""InterceptionCommunications"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk JudicialCosts,class,https://w3id.org/dpv/risk#JudicialCosts,Judicial Costs,Something that involves or causes judicial costs to be paid,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,,,risk,https://w3id.org/dpv/risk JudicialPenalty,class,https://w3id.org/dpv/risk#JudicialPenalty,Judicial Penalty,Something that involves or causes judicial penalties to be paid,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,,,risk,https://w3id.org/dpv/risk LegalRisk,class,https://w3id.org/dpv/risk#LegalRisk,Legal Risk,Risks and issues that have their basis in legal requirements and enforcement,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk @@ -110,15 +109,15 @@ LoseOpportunity,class,https://w3id.org/dpv/risk#LoseOpportunity,Lose of Opportun LoseReputation,class,https://w3id.org/dpv/risk#LoseReputation,Lose of Reputation,Something that acts as or causes Loss of Reputation,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk LoseTrust,class,https://w3id.org/dpv/risk#LoseTrust,Lose of Trust,Something that acts as or causes Loss of Trust,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk LowLikelihood,class,https://w3id.org/dpv/risk#LowLikelihood,Low Likelihood,Level where Likelihood is Low,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#3LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -LowRisk,class,https://w3id.org/dpv/risk#LowRisk,Low Risk,Level where Risk is Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#3RiskLevels;https://w3id.org/dpv/risk#7RiskLevels;https://w3id.org/dpv/risk#5RiskLevels,The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -LowSeverity,class,https://w3id.org/dpv/risk#LowSeverity,Low Severity,Level where Severity is Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#3SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -MaliciousCodeAttack,class,https://w3id.org/dpv/risk#MaliciousCodeAttack,Malicious Code Attack,Something that acts as or causes Malicious Code Attack,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -MalwareAttack,class,https://w3id.org/dpv/risk#MalwareAttack,Malware Attack,Something that acts as or causes Malware Attack,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +LowRisk,class,https://w3id.org/dpv/risk#LowRisk,Low Risk,Level where Risk is Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#3RiskLevels;https://w3id.org/dpv/risk#5RiskLevels;https://w3id.org/dpv/risk#7RiskLevels,The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +LowSeverity,class,https://w3id.org/dpv/risk#LowSeverity,Low Severity,Level where Severity is Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels;https://w3id.org/dpv/risk#3SeverityLevels,The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +MaliciousCodeAttack,class,https://w3id.org/dpv/risk#MaliciousCodeAttack,Malicious Code Attack,Something that acts as or causes Malicious Code Attack,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +MalwareAttack,class,https://w3id.org/dpv/risk#MalwareAttack,Malware Attack,Something that acts as or causes Malware Attack,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk MaterialDamage,class,https://w3id.org/dpv/risk#MaterialDamage,Material Damage,Something that acts as or causes Material Damage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,The criteria for what is considered material damage is based in jurisdictional laws and norms,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk Misuse,class,https://w3id.org/dpv/risk#Misuse,Misuse,Something that acts as or causes Misuse,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,2024-06-11,2024-08-16,risk,https://w3id.org/dpv/risk ModerateLikelihood,class,https://w3id.org/dpv/risk#ModerateLikelihood,Moderate Likelihood,Level where Likelihood is Moderate,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#3LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -ModerateRisk,class,https://w3id.org/dpv/risk#ModerateRisk,Moderate Risk,Level where Risk is Moderate,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#3RiskLevels;https://w3id.org/dpv/risk#7RiskLevels;https://w3id.org/dpv/risk#5RiskLevels,The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -ModerateSeverity,class,https://w3id.org/dpv/risk#ModerateSeverity,Moderate Severity,Level where Severity is Moderate,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#3SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +ModerateRisk,class,https://w3id.org/dpv/risk#ModerateRisk,Moderate Risk,Level where Risk is Moderate,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#3RiskLevels;https://w3id.org/dpv/risk#5RiskLevels;https://w3id.org/dpv/risk#7RiskLevels,The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +ModerateSeverity,class,https://w3id.org/dpv/risk#ModerateSeverity,Moderate Severity,Level where Severity is Moderate,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels;https://w3id.org/dpv/risk#3SeverityLevels,The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk MonitorConsequence,class,https://w3id.org/dpv/risk#MonitorConsequence,Monitor Consequence,Control that monitors a Risk Consequence,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#MonitorControl,,2024-05-19,,risk,https://w3id.org/dpv/risk MonitorControl,class,https://w3id.org/dpv/risk#MonitorControl,Monitor Control,Risk Mitigation Measure that uses controls to monitor events,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,"Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.",2024-05-19,,risk,https://w3id.org/dpv/risk MonitorImpact,class,https://w3id.org/dpv/risk#MonitorImpact,Monitor Impact,Control that monitors a Risk Impact,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#MonitorControl,,2024-05-19,,risk,https://w3id.org/dpv/risk @@ -130,7 +129,7 @@ NonMaterialDamage,class,https://w3id.org/dpv/risk#NonMaterialDamage,Non-Material OperationalSecurityRisk,class,https://w3id.org/dpv/risk#OperationalSecurityRisk,Operational Security Risk,Risks and issues that arise during operational processes,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk Payment,class,https://w3id.org/dpv/risk#Payment,Payment,Something that acts as or provides payment e.g. to access a service or purchase resources,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk PersonalSafetyEndangerment,class,https://w3id.org/dpv/risk#PersonalSafetyEndangerment,Personal Safety Endangerment,Something that acts as or causes Personal Safety Endangerment,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -PhishingScam,class,https://w3id.org/dpv/risk#PhishingScam,Phishing Scam,Something that acts as or causes Phishing Scam,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +PhishingScam,class,https://w3id.org/dpv/risk#PhishingScam,Phishing Scam,Something that acts as or causes Phishing Scam,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk PhysicalAssault,class,https://w3id.org/dpv/risk#PhysicalAssault,Physical Assault,Something that acts as or causes Physical Assault,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk PhysicalHarm,class,https://w3id.org/dpv/risk#PhysicalHarm,Physical Harm,,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,,,risk,https://w3id.org/dpv/risk Privacy,class,https://w3id.org/dpv/risk#Privacy,Privacy,,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,,,risk,https://w3id.org/dpv/risk @@ -223,7 +222,7 @@ RecoveryControl,class,https://w3id.org/dpv/risk#RecoveryControl,Recovery Control ReduceLikelihood,class,https://w3id.org/dpv/risk#ReduceLikelihood,Reduce Likelihood,Control that reduces the likelihood of an event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ReductionControl,,2024-05-19,,risk,https://w3id.org/dpv/risk ReduceSeverity,class,https://w3id.org/dpv/risk#ReduceSeverity,Reduce Severity,Control that reduces the severity of an event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ReductionControl,,2024-05-19,,risk,https://w3id.org/dpv/risk ReductionControl,class,https://w3id.org/dpv/risk#ReductionControl,Reduction Control,Control that reduces the likelihood or severity of an event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -Reidentification,class,https://w3id.org/dpv/risk#Reidentification,Re-identification,Something that acts as or causes Re-identification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk +Reidentification,class,https://w3id.org/dpv/risk#Reidentification,Re-identification,Something that acts as or causes Re-identification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk RemedyControl,class,https://w3id.org/dpv/risk#RemedyControl,Remedy Control,Control to remedy consequences of event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk RemoveConsequence,class,https://w3id.org/dpv/risk#RemoveConsequence,Remove Consequence,Control that removes Consequence i.e. prevents it from materialising,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ConsequenceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk RemoveImpact,class,https://w3id.org/dpv/risk#RemoveImpact,Remove Impact,Control that removes Impact i.e. prevents it from materialising,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ImpactControl,,2024-05-19,,risk,https://w3id.org/dpv/risk @@ -244,45 +243,45 @@ RiskMatrix3x3,class,https://w3id.org/dpv/risk#RiskMatrix3x3,Risk Matrix 3x3,"A R RiskMatrix5x5,class,https://w3id.org/dpv/risk#RiskMatrix5x5,Risk Matrix 5x5,"A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types",https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix,,2022-08-17,,risk,https://w3id.org/dpv/risk RiskMatrix7x7,class,https://w3id.org/dpv/risk#RiskMatrix7x7,Risk Matrix 7x7,"A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types",https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix,,2022-08-17,,risk,https://w3id.org/dpv/risk RiskSource,class,https://w3id.org/dpv/risk#RiskSource,Risk Source,"The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk",,https://w3id.org/dpv#RiskConcept,https://w3id.org/dpv#RiskConcept,,2024-02-14,2024-08-16,risk,https://w3id.org/dpv/risk -Sabotage,class,https://w3id.org/dpv/risk#Sabotage,Sabotage,Something that acts as or causes Sabotage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -Scam,class,https://w3id.org/dpv/risk#Scam,Scam,Something that acts as or causes Scam,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -SecurityAttack,class,https://w3id.org/dpv/risk#SecurityAttack,Security Attack,Something that acts as or causes an attack on security with the aim of undermining it,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk -SecurityBreach,class,https://w3id.org/dpv/risk#SecurityBreach,Security Breach,Something that acts as or causes Security Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Sabotage,class,https://w3id.org/dpv/risk#Sabotage,Sabotage,Something that acts as or causes Sabotage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Scam,class,https://w3id.org/dpv/risk#Scam,Scam,Something that acts as or causes Scam,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SecurityAttack,class,https://w3id.org/dpv/risk#SecurityAttack,Security Attack,Something that acts as or causes an attack on security with the aim of undermining it,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk +SecurityBreach,class,https://w3id.org/dpv/risk#SecurityBreach,Security Breach,Something that acts as or causes Security Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk SexualViolence,class,https://w3id.org/dpv/risk#SexualViolence,Sexual Violence,Something that acts as or causes Sexual Violence,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ShareRisk,class,https://w3id.org/dpv/risk#ShareRisk,Share Risk,Risk Mitigation Measure that shares Risk e.g. amongst stakeholders,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk SocialDisadvantage,class,https://w3id.org/dpv/risk#SocialDisadvantage,Social Disadvantage,Something that acts as or causes Social Disadvantage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk SocietalHealthSafety,class,https://w3id.org/dpv/risk#SocietalHealthSafety,Societal Health & Safety,,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,,,risk,https://w3id.org/dpv/risk SocietalRisk,class,https://w3id.org/dpv/risk#SocietalRisk,Societal Risk,Risks and issues that affect or have the potential to affect society at large or specific groups in society,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk SourceControl,class,https://w3id.org/dpv/risk#SourceControl,Source Control,Risk Mitigation Measure that controls the Source,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -Spoofing,class,https://w3id.org/dpv/risk#Spoofing,Spoofing,Something that acts as or causes Spoofing,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -SystemFailure,class,https://w3id.org/dpv/risk#SystemFailure,System Failure,Something that acts as or causes System Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -SystemIntrusion,class,https://w3id.org/dpv/risk#SystemIntrusion,System Intrusion,Something that acts as or causes System Intrusion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -SystemMalfunction,class,https://w3id.org/dpv/risk#SystemMalfunction,System Malfunction,Something that acts as or causes System Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Spoofing,class,https://w3id.org/dpv/risk#Spoofing,Spoofing,Something that acts as or causes Spoofing,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SystemFailure,class,https://w3id.org/dpv/risk#SystemFailure,System Failure,Something that acts as or causes System Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SystemIntrusion,class,https://w3id.org/dpv/risk#SystemIntrusion,System Intrusion,Something that acts as or causes System Intrusion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SystemMalfunction,class,https://w3id.org/dpv/risk#SystemMalfunction,System Malfunction,Something that acts as or causes System Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk Terrorism,class,https://w3id.org/dpv/risk#Terrorism,Terrorism,Something that acts as or causes Terrorism,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk Threat,class,https://w3id.org/dpv/risk#Threat,Threat,Risk source event which causes Risk,,https://w3id.org/dpv/risk#RiskSource,https://w3id.org/dpv/risk#RiskSource,,2024-02-14,,risk,https://w3id.org/dpv/risk ThreatSource,class,https://w3id.org/dpv/risk#ThreatSource,Threat Source,"Source of threat event, including both agent and non-agent sources",,,,,2024-02-14,,risk,https://w3id.org/dpv/risk -UnauthorisedAccesstoPremises,class,https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises,Unauthorised Access to Premises,Something that acts as or causes Unauthorised Access to Premises,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedActivity,class,https://w3id.org/dpv/risk#UnauthorisedActivity,Unauthorised Activity,Something that acts as or causes Unauthorised Activity,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk -UnauthorisedCodeAccess,class,https://w3id.org/dpv/risk#UnauthorisedCodeAccess,Unauthorised Code Access,Something that acts as or causes Unauthorised Code Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedCodeDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure,Unauthorised Code Disclosure,Something that acts as or causes Unauthorised Code Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedCodeModification,class,https://w3id.org/dpv/risk#UnauthorisedCodeModification,Unauthorised Code Modification,Something that acts as or causes Unauthorised Code Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedDataAccess,class,https://w3id.org/dpv/risk#UnauthorisedDataAccess,Unauthorised Data Access,Something that acts as or causes Unauthorised Data Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedDataDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedDataDisclosure,Unauthorised Data Disclosure,Something that acts as or causes Unauthorised Data Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedDataModification,class,https://w3id.org/dpv/risk#UnauthorisedDataModification,Unauthorised Data Modification,Something that acts as or causes Unauthorised Data Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedInformationDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure,Unauthorised Information Disclosure,Something that acts as or causes Unauthorised Information Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedReidentification,class,https://w3id.org/dpv/risk#UnauthorisedReidentification,Unauthorised Re-Identification,Something that acts as or causes Unauthorised Re-Identification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedResourceUse,class,https://w3id.org/dpv/risk#UnauthorisedResourceUse,Unauthorised Resource Use,Something that acts as or causes Unauthorised Resource Use,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedSystemAccess,class,https://w3id.org/dpv/risk#UnauthorisedSystemAccess,Unauthorised System Access,Something that acts as or causes Unauthorised System Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedSystemModification,class,https://w3id.org/dpv/risk#UnauthorisedSystemModification,Unauthorised System Modification,Something that acts as or causes Unauthorised System Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnwantedCodeDeletion,class,https://w3id.org/dpv/risk#UnwantedCodeDeletion,Unwanted Code Deletion,Something that acts as or causes Unwanted Code Deletion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnwantedDataDeletion,class,https://w3id.org/dpv/risk#UnwantedDataDeletion,Unwanted Data Deletion,Something that acts as or causes Unwanted Data Deletion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnwantedDisclosureData,class,https://w3id.org/dpv/risk#UnwantedDisclosureData,Unwanted Disclosure of Data,Something that acts as or causes Unwanted Disclosure of Data,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedAccesstoPremises,class,https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises,Unauthorised Access to Premises,Something that acts as or causes Unauthorised Access to Premises,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedActivity,class,https://w3id.org/dpv/risk#UnauthorisedActivity,Unauthorised Activity,Something that acts as or causes Unauthorised Activity,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk +UnauthorisedCodeAccess,class,https://w3id.org/dpv/risk#UnauthorisedCodeAccess,Unauthorised Code Access,Something that acts as or causes Unauthorised Code Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedCodeDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure,Unauthorised Code Disclosure,Something that acts as or causes Unauthorised Code Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedCodeModification,class,https://w3id.org/dpv/risk#UnauthorisedCodeModification,Unauthorised Code Modification,Something that acts as or causes Unauthorised Code Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedDataAccess,class,https://w3id.org/dpv/risk#UnauthorisedDataAccess,Unauthorised Data Access,Something that acts as or causes Unauthorised Data Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedDataDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedDataDisclosure,Unauthorised Data Disclosure,Something that acts as or causes Unauthorised Data Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedDataModification,class,https://w3id.org/dpv/risk#UnauthorisedDataModification,Unauthorised Data Modification,Something that acts as or causes Unauthorised Data Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedInformationDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure,Unauthorised Information Disclosure,Something that acts as or causes Unauthorised Information Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedReidentification,class,https://w3id.org/dpv/risk#UnauthorisedReidentification,Unauthorised Re-Identification,Something that acts as or causes Unauthorised Re-Identification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedResourceUse,class,https://w3id.org/dpv/risk#UnauthorisedResourceUse,Unauthorised Resource Use,Something that acts as or causes Unauthorised Resource Use,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedSystemAccess,class,https://w3id.org/dpv/risk#UnauthorisedSystemAccess,Unauthorised System Access,Something that acts as or causes Unauthorised System Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedSystemModification,class,https://w3id.org/dpv/risk#UnauthorisedSystemModification,Unauthorised System Modification,Something that acts as or causes Unauthorised System Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnwantedCodeDeletion,class,https://w3id.org/dpv/risk#UnwantedCodeDeletion,Unwanted Code Deletion,Something that acts as or causes Unwanted Code Deletion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnwantedDataDeletion,class,https://w3id.org/dpv/risk#UnwantedDataDeletion,Unwanted Data Deletion,Something that acts as or causes Unwanted Data Deletion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnwantedDisclosureData,class,https://w3id.org/dpv/risk#UnwantedDisclosureData,Unwanted Disclosure of Data,Something that acts as or causes Unwanted Disclosure of Data,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk UserRisks,class,https://w3id.org/dpv/risk#UserRisks,User Risks,Concepts associated with risks that arise due to User or Human use,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk VeryHighLikelihood,class,https://w3id.org/dpv/risk#VeryHighLikelihood,Very High Likelihood,Level where Likelihood is Very High,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -VeryHighRisk,class,https://w3id.org/dpv/risk#VeryHighRisk,Very High Risk,Level where Risk is Very High,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#7RiskLevels;https://w3id.org/dpv/risk#5RiskLevels,The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +VeryHighRisk,class,https://w3id.org/dpv/risk#VeryHighRisk,Very High Risk,Level where Risk is Very High,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#5RiskLevels;https://w3id.org/dpv/risk#7RiskLevels,The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk VeryHighSeverity,class,https://w3id.org/dpv/risk#VeryHighSeverity,Very High Severity,Level where Severity is Very High,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk VeryLowLikelihood,class,https://w3id.org/dpv/risk#VeryLowLikelihood,Very Low Likelihood,Level where Likelihood is Very Low,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -VeryLowRisk,class,https://w3id.org/dpv/risk#VeryLowRisk,Very Low Risk,Level where Risk is Very Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#7RiskLevels;https://w3id.org/dpv/risk#5RiskLevels,The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +VeryLowRisk,class,https://w3id.org/dpv/risk#VeryLowRisk,Very Low Risk,Level where Risk is Very Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#5RiskLevels;https://w3id.org/dpv/risk#7RiskLevels,The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk VeryLowSeverity,class,https://w3id.org/dpv/risk#VeryLowSeverity,Very Low Severity,Level where Severity is Very Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk ViolatingCodeOfConduct,class,https://w3id.org/dpv/risk#ViolatingCodeOfConduct,Violating Code of Conduct,Something that acts as or causes Violation of Code of Conduct,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""ViolationCodeConduct"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ViolatingContractualObligation,class,https://w3id.org/dpv/risk#ViolatingContractualObligation,Violation of Contractual Obligation,Something that acts as or causes Violation of Contractual Obligations,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""ViolationContractualObligations"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk @@ -292,7 +291,6 @@ ViolatingPolicy,class,https://w3id.org/dpv/risk#ViolatingPolicy,Violating Policy ViolatingStatutoryObligations,class,https://w3id.org/dpv/risk#ViolatingStatutoryObligations,Violation of Statutory Obligations,Something that acts as or causes Violation of Statutory Obligations,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""ViolationStatutoryObligations"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ViolenceAgainstChildren,class,https://w3id.org/dpv/risk#ViolenceAgainstChildren,Violence against children,Something that acts as or causes Child Violence,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,"This concept was called ""ChildViolence"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk Vulnerability,class,https://w3id.org/dpv/risk#Vulnerability,Vulnerability,Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk,,,,,2024-02-14,,risk,https://w3id.org/dpv/risk -VulnerabilityCreated,class,https://w3id.org/dpv/risk#VulnerabilityCreated,Vulnerability Created,Something that acts as or causes Vulnerability Created,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#InternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk causedByThreat,property,https://w3id.org/dpv/risk#causedByThreat,caused by threat,Indicates the cause of associated context (subject) was the indicated threat (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk causedByVulnerability,property,https://w3id.org/dpv/risk#causedByVulnerability,caused by vulnerability,Indicates the associated context (subject) is caused by the indicated vulnerability (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk exploitsVulnerability,property,https://w3id.org/dpv/risk#exploitsVulnerability,exploits vulnerability,Indicates the threat (subject) exploits the indicated vulnerability (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk diff --git a/2.1-dev/risk/risk.html b/2.1-dev/risk/risk.html index c8b42bf5f..4efbea699 100644 --- a/2.1-dev/risk/risk.html +++ b/2.1-dev/risk/risk.html @@ -1271,92 +1271,77 @@

Consequences and Impacts

dpv:hasImpact risk:RightsImpact . -

The risk concepts taxonomy is broadly divided into the following categories:

+

The concepts taxonomy is broadly divided into the following categories:

-
-

InternalSecurityThreat

-
    +
    +

    CIA Model

    +

    Confidentiality

    +
    • - risk:VulnerabilityCreated: Something that acts as or causes Vulnerability Created - go to full definition + risk:AuthorisationFailure: Something that acts as or causes Authorisation Failure + go to full definition
    • -
    -
    -
    -

    UserRisks

    -
    -
    -
    -

    ExternalSecurityThreat

    -
    • - risk:Blackmail: Something that acts as or causes Blackmail - go to full definition + risk:ConfidentialityBreach: Something that acts as or causes Confidentiality Breach + go to full definition
    • - risk:BruteForceAuthorisations: Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques - go to full definition - -
    • + risk:DataBreach: Something that acts as or causes Data Breach + go to full definition +
    • risk:Extorsion: Something that acts as or causes Extorsion @@ -1367,6 +1352,16 @@

      ExternalSecurityThreat

      risk:Fraud: Something that acts as or causes Fraud go to full definition +
    • +
    • + risk:IdentityFraud: Something that acts as or causes Identity Fraud + go to full definition + +
    • +
    • + risk:IdentityTheft: Something that acts as or causes Identity Theft + go to full definition +
    • risk:InterceptCommunications: Something that acts as or causes Interception of Communications @@ -1389,8 +1384,8 @@

      ExternalSecurityThreat

    • - risk:Sabotage: Something that acts as or causes Sabotage - go to full definition + risk:Reidentification: Something that acts as or causes Re-identification + go to full definition
    • @@ -1402,6 +1397,33 @@

      ExternalSecurityThreat

      risk:SecurityAttack: Something that acts as or causes an attack on security with the aim of undermining it go to full definition +
    • +
    • + risk:SecurityBreach: Something that acts as or causes Security Breach + go to full definition +
    • risk:Spoofing: Something that acts as or causes Spoofing @@ -1432,11 +1454,6 @@

      ExternalSecurityThreat

      risk:UnauthorisedCodeDisclosure: Something that acts as or causes Unauthorised Code Disclosure go to full definition -
    • -
    • - risk:UnauthorisedCodeModification: Something that acts as or causes Unauthorised Code Modification - go to full definition -
    • risk:UnauthorisedDataAccess: Something that acts as or causes Unauthorised Data Access @@ -1447,11 +1464,6 @@

      ExternalSecurityThreat

      risk:UnauthorisedDataDisclosure: Something that acts as or causes Unauthorised Data Disclosure go to full definition -
    • -
    • - risk:UnauthorisedDataModification: Something that acts as or causes Unauthorised Data Modification - go to full definition -
    • risk:UnauthorisedInformationDisclosure: Something that acts as or causes Unauthorised Information Disclosure @@ -1464,8 +1476,145 @@

      ExternalSecurityThreat

    • - risk:UnauthorisedResourceUse: Something that acts as or causes Unauthorised Resource Use - go to full definition + risk:UnauthorisedSystemAccess: Something that acts as or causes Unauthorised System Access + go to full definition + +
    • +
    • + risk:UnwantedDisclosureData: Something that acts as or causes Unwanted Disclosure of Data + go to full definition + +
    • +
    + +

    Integrity

    +
    -
    -
    -

    OperationalSecurityRisk

    -
      + +

      Availability

      +
      • - risk:AuthorisationFailure: Something that acts as or causes Authorisation Failure - go to full definition + risk:AvailabilityBreach: None + go to full definition
      • @@ -1519,13 +1662,39 @@

        OperationalSecurityRisk

      • - risk:CompromiseAccountCredentials: Something that acts as or causes Account Credentials to be compromised - go to full definition + risk:Cryptojacking: Something that acts as or causes Cryptojacking + go to full definition
      • - risk:DataCorruption: Something that acts as or causes Corruption of Data - go to full definition + risk:DataBreach: Something that acts as or causes Data Breach + go to full definition + +
      • +
      • + risk:DenialServiceAttack: Something that acts as or causes Denial of Service Attack (DoS) + go to full definition + +
      • +
      • + risk:DistributedDenialServiceAttack: Something that acts as or causes Distributed Denial of Service Attack (DDoS) + go to full definition
      • @@ -1539,18 +1708,23 @@

        OperationalSecurityRisk

      • - risk:IdentityFraud: Something that acts as or causes Identity Fraud - go to full definition + risk:MaliciousCodeAttack: Something that acts as or causes Malicious Code Attack + go to full definition
      • - risk:IdentityTheft: Something that acts as or causes Identity Theft - go to full definition + risk:MalwareAttack: Something that acts as or causes Malware Attack + go to full definition
      • - risk:Reidentification: Something that acts as or causes Re-identification - go to full definition + risk:Sabotage: Something that acts as or causes Sabotage + go to full definition + +
      • +
      • + risk:SecurityAttack: Something that acts as or causes an attack on security with the aim of undermining it + go to full definition
      • @@ -1581,13 +1755,13 @@

        OperationalSecurityRisk

    • - risk:Spoofing: Something that acts as or causes Spoofing - go to full definition + risk:SystemFailure: Something that acts as or causes System Failure + go to full definition
    • - risk:SystemFailure: Something that acts as or causes System Failure - go to full definition + risk:SystemIntrusion: Something that acts as or causes System Intrusion + go to full definition
    • @@ -1595,11 +1769,68 @@

      OperationalSecurityRisk

      go to full definition
    • +
    • + risk:UnauthorisedAccesstoPremises: Something that acts as or causes Unauthorised Access to Premises + go to full definition + +
    • +
    • + risk:UnauthorisedActivity: Something that acts as or causes Unauthorised Activity + go to full definition + +
    • +
    • + risk:UnauthorisedResourceUse: Something that acts as or causes Unauthorised Resource Use + go to full definition + +
    • +
    • + risk:UnwantedCodeDeletion: Something that acts as or causes Unwanted Code Deletion + go to full definition + +
    • +
    • + risk:UnwantedDataDeletion: Something that acts as or causes Unwanted Data Deletion + go to full definition + +
    -
    -
    -

    LegalRisk

    -
      +
    + +
    +

    User

    +
    +
    + +
    +

    Legal

    +
    • risk:CopyrightViolation: Something that acts as or causes Copyright Violation go to full definition @@ -1666,10 +1897,11 @@

      LegalRisk

    -
    -
    -

    ReputationalRisk

    -
      +
    + +
    +

    Reputational

    +
    • risk:LoseCredibility: Something that acts as or causes Loss of Credibility go to full definition @@ -1706,10 +1938,11 @@

      ReputationalRisk

    -
    -
    -

    SocietalRisk

    -
      +
    + +
    +

    Societal

    +
    • risk:Discrimination: Something that acts as or causes Discrimination go to full definition @@ -1761,10 +1994,11 @@

      SocietalRisk

    -
    -
    -

    IndividualRisk

    -
      +
    + +
    +

    Individual

    +
    • risk:Harm: Something that acts as or causes Harm to humans go to full definition @@ -1811,14 +2045,16 @@

      IndividualRisk

    -
    -
    -

    EnvironmentalRisk

    -
    -
    -
    -

    FinancialImpact

    -
      +
    + +
    +

    Environmental

    +
    +
    + +
    +

    Financial

    +
    • risk:Benefit: Something that acts as or causes benefits go to full definition @@ -1865,7 +2101,7 @@

      FinancialImpact

    -
    +
@@ -2128,8 +2364,6 @@

Classes

- - @@ -3007,6 +3241,12 @@

Authorisation Failure

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types + risk:IntegrityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -3088,6 +3328,33 @@

None

Broader/Parent types + risk:DataBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:IntegrityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:IntegrityConcept + + Broader/Parent types risk:DataBreachrisk:SecurityBreachrisk:OperationalSecurityRisk @@ -3392,6 +3659,9 @@

Blackmail

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -3473,8 +3743,14 @@

Brute Force Authorisations

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -3724,6 +4000,9 @@

Coercion

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -3883,6 +4162,9 @@

Component Failure

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -3955,6 +4237,9 @@

Component Malfunction

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -4027,6 +4312,15 @@

Compromise Account

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types + risk:IntegrityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -4108,6 +4402,9 @@

Compromise Account Credentials

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -4189,6 +4486,33 @@

Confidentiality Breach

Broader/Parent types + risk:DataBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:IntegrityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:IntegrityConcept + + Broader/Parent types risk:DataBreachrisk:SecurityBreachrisk:OperationalSecurityRisk @@ -4666,6 +4990,9 @@

Cryptojacking

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -4825,6 +5152,18 @@

Data Breach

Broader/Parent types + risk:SecurityBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:SecurityBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:SecurityBreach + → risk:IntegrityConcept + + Broader/Parent types risk:SecurityBreachrisk:OperationalSecurityRiskdpv:RiskConcept @@ -4910,6 +5249,9 @@

Data Corruption

Broader/Parent types + risk:IntegrityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -5069,6 +5411,9 @@

Denial of Service Attack (DoS)

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -5092,7 +5437,7 @@

Denial of Service Attack (DoS)

Source - ISO/IEC 27005:2018, ISO/IEC 27005:2018 + ISO/IEC 27005:2018 @@ -5385,6 +5730,9 @@

Distributed Denial of Service Attack (DDoS)

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -5609,6 +5957,9 @@

Equipment Failure

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -5693,6 +6044,9 @@

Equipment Malfunction

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -6012,6 +6366,9 @@

Extorsion

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -6815,6 +7172,9 @@

Fraud

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -7499,6 +7859,9 @@

Identity Fraud

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -7580,6 +7943,9 @@

Identity Theft

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -7862,7 +8228,7 @@

Incident

Date Created - 2024-02-14 + 2024-05-19 Date Modified @@ -9873,6 +10239,33 @@

None

Broader/Parent types + risk:DataBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:IntegrityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:IntegrityConcept + + Broader/Parent types risk:DataBreachrisk:SecurityBreachrisk:OperationalSecurityRisk @@ -10085,6 +10478,9 @@

Intercept Communications

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -10141,74 +10537,6 @@

Intercept Communications

-
-

Internal Security Threat

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
TermInternalSecurityThreatPrefixrisk
LabelInternal Security Threat
IRIhttps://w3id.org/dpv/risk#InternalSecurityThreat
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types dpv:RiskConcept -
DefinitionConcepts associated with security threats and issues that originate within the organisation
See More: section RISK-CONSEQUENCES in RISK -
-
- - - @@ -11284,8 +11612,17 @@

Malicious Code Attack

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -11365,8 +11702,17 @@

Malware Attack

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -12766,6 +13112,9 @@

Phishing Scam

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -13544,6 +13893,9 @@

Re-identification

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -21592,8 +21944,14 @@

Sabotage

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -21673,6 +22031,9 @@

Scam

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -21754,8 +22115,17 @@

Security Attack

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -21823,6 +22193,15 @@

Security Breach

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types + risk:IntegrityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -22365,10 +22744,16 @@

Spoofing

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept Broader/Parent types + risk:IntegrityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -22450,6 +22835,9 @@

System Failure

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -22534,8 +22922,17 @@

System Intrusion

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -22615,6 +23012,9 @@

System Malfunction

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -22933,8 +23333,17 @@

Unauthorised Access to Premises

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23014,8 +23423,17 @@

Unauthorised Activity

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23083,8 +23501,14 @@

Unauthorised Code Access

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23164,6 +23588,9 @@

Unauthorised Code Disclosure

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23247,6 +23674,9 @@

Unauthorised Code Modification

Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23326,6 +23756,9 @@

Unauthorised Data Access

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23407,6 +23840,9 @@

Unauthorised Data Disclosure

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23490,6 +23926,9 @@

Unauthorised Data Modification

Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23569,6 +24008,9 @@

Unauthorised Information Disclosure

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23650,6 +24092,9 @@

Unauthorised Re-Identification

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23728,6 +24173,9 @@

Unauthorised Resource Use

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23809,8 +24257,14 @@

Unauthorised System Access

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23892,6 +24346,9 @@

Unauthorised System Modification

Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23971,8 +24428,14 @@

Unwanted Code Deletion

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -24052,8 +24515,14 @@

Unwanted Data Deletion

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -24133,6 +24602,9 @@

Unwanted Disclosure of Data

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -25417,87 +25889,6 @@

Vulnerability

- - - -
-

Vulnerability Created

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
TermVulnerabilityCreatedPrefixrisk
LabelVulnerability Created
IRIhttps://w3id.org/dpv/risk#VulnerabilityCreated
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:InternalSecurityThreat - → dpv:RiskConcept -
DefinitionSomething that acts as or causes Vulnerability Created
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK -
-
@@ -25630,8 +26021,6 @@

Properties

- - @@ -26435,9 +26824,6 @@

has vulnerability

- - - @@ -27237,9 +27623,6 @@

refers to risk

- - - @@ -27334,8 +27717,6 @@

External

- - @@ -27637,9 +28018,6 @@

External

- - - @@ -28223,9 +28601,6 @@

External

- - -
diff --git a/2.1-dev/risk/risk.jsonld b/2.1-dev/risk/risk.jsonld index 311a67a9c..fae734642 100644 --- a/2.1-dev/risk/risk.jsonld +++ b/2.1-dev/risk/risk.jsonld @@ -1,6 +1,6 @@ [ { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L5", + "@id": "https://w3id.org/dpv/risk#RM7x7S4L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -19,7 +19,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.10,xsd:decimal" + "@value": "0.41,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -41,7 +41,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -52,7 +52,57 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:1 L:5)" + "@value": "High Risk (RM7x7 S:4 L:5)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ComponentFailure", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Component Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Component Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of" } ] }, @@ -82,7 +132,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nef681cfae64c43969ff8ef7fdde7753a" + "@id": "_:N9b03e23aa8864f4288a1885778e3b1e4" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -97,6 +147,12 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -120,7 +176,7 @@ ] }, { - "@id": "_:Nef681cfae64c43969ff8ef7fdde7753a", + "@id": "_:N9b03e23aa8864f4288a1885778e3b1e4", "@type": [ "https://schema.org/WebPage" ], @@ -136,11 +192,17 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#LowSeverity", + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S4L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -150,12 +212,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.25,xsd:decimal" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -171,36 +233,24 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3SeverityLevels" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" + "@value": "Low Risk (RM7x7 S:4 L:2)" } ] }, @@ -257,25 +307,32 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#hasRiskSource", + "@id": "https://w3id.org/dpv/risk#IdentityFraud", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv#Risk" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk#RiskSource" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/modified": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nc74530c53d534886a66e5a7f741398bb" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -289,40 +346,54 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the risk (subject) has the indicated risk source (object)" + "@value": "Something that acts as or causes Identity Fraud" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has risk source" + "@value": "Identity Fraud" } + ] + }, + { + "@id": "_:Nc74530c53d534886a66e5a7f741398bb", + "@type": [ + "https://schema.org/WebPage" ], - "https://schema.org/domainIncludes": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv#Risk" + "@value": "ENISA Threat Taxonomy 2016" } ], - "https://schema.org/rangeIncludes": [ + "https://schema.org/url": [ { - "@id": "https://w3id.org/dpv/risk#RiskSource" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk#3SeverityLevels", + "@id": "https://w3id.org/dpv/risk#LoseNegotiatingCapacity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -332,7 +403,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nf8d97cf300cf44d5881be9535d0b1dff" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -348,54 +430,63 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Severity" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 3 Severity Levels from High to Low" + "@value": "Something that acts as or causes Loss of Negotiating Capacity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "3 Severity Levels" + "@value": "Lose of Negotiating Capacity" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure", + "@id": "_:Nf8d97cf300cf44d5881be9535d0b1dff", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#hasRiskSource", + "@type": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@id": "https://w3id.org/dpv#Risk" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#RiskSource" + } + ], + "http://purl.org/dc/terms/created": [ { - "@id": "_:N540e39aa17014568ba5a2b03534c1f19" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -409,51 +500,40 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Disclosure" + "@value": "Indicates the risk (subject) has the indicated risk source (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Disclosure" + "@value": "has risk source" } - ] - }, - { - "@id": "_:N540e39aa17014568ba5a2b03534c1f19", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "https://schema.org/domainIncludes": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@id": "https://w3id.org/dpv#Risk" } ], - "https://schema.org/url": [ + "https://schema.org/rangeIncludes": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@id": "https://w3id.org/dpv/risk#RiskSource" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L5", + "@id": "https://w3id.org/dpv/risk#ExtremelyLowSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -463,12 +543,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.20,xsd:decimal" + "@value": "0.01,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -484,47 +564,60 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" + "@value": "Level where Severity is Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:2 L:5)" + "@value": "Extremely Low Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentDetectionReport", + "@id": "https://w3id.org/dpv/risk#Discrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog" + } + ], + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-19" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk#" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -535,33 +628,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the detection of a Incident" + "@value": "Something that acts as or causes Discrimination" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Detection Report" + "@value": "Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingStatutoryObligations", + "@id": "https://w3id.org/dpv/risk#RM7x7S6L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -574,15 +667,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nb5000792f7ae42ffb4c7efe3b93be7df" + "@value": "0.61,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -593,87 +680,86 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Statutory Obligations" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Statutory Obligations" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0" + "@value": "Very High Risk (RM7x7 S:6 L:5)" } ] }, { - "@id": "_:Nb5000792f7ae42ffb4c7efe3b93be7df", + "@id": "https://w3id.org/dpv/risk#ConsequenceControl", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } - ] - }, - { - "@id": "https://w3id.org/dpv/examples", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.w3.org/TR/html/" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@value": "Examples for Data Privacy Vocabulary" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/examples" + "@language": "en", + "@value": "Risk Mitigation Measure that controls the Consequences" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Consequence Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingEthicsCode", + "@id": "https://w3id.org/dpv/risk#RightsImpact", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -698,7 +784,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd8ddc1f8024a4418b62c344837cff0cd" + "@id": "_:N7b552ef83c274f84b167cc68c23676bb" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -709,18 +795,21 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" + }, + { + "@id": "https://w3id.org/dpv#Impact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Ethics Code" + "@value": "Something that acts as or causes Impact to Rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -731,18 +820,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Ethics Code" + "@value": "Impact to Rights" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0" + "@value": "This concept was called \"ImpactToRights\" in DPV 2.0" } ] }, { - "@id": "_:Nd8ddc1f8024a4418b62c344837cff0cd", + "@id": "_:N7b552ef83c274f84b167cc68c23676bb", "@type": [ "https://schema.org/WebPage" ], @@ -758,7 +847,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#MonitorRiskControl", + "@id": "https://w3id.org/dpv/risk#ImpactControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -788,13 +877,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MonitorControl" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors another Control" + "@value": "Risk Mitigation Measure that controls Impacts" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -805,27 +894,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Control" + "@value": "Impact Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#5SeverityLevels", + "@id": "https://w3id.org/dpv/risk#ViolatingPolicy", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -840,33 +918,32 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Severity" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 5 Severity Levels from Very High to Very Low" + "@value": "Something that acts as or causes violation of policy which can be either internal or external policy" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "5 Severity Levels" + "@value": "Violating Policy" } ] }, { - "@id": "https://w3id.org/dpv/risk#RecoveryControl", + "@id": "https://w3id.org/dpv/risk#IncidentNotice", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { @@ -879,6 +956,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#Notice" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -887,33 +969,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv#Notice" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to recover from event" + "@value": "Notice associated with an Incident" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Recovery Control" + "@value": "Incident Notice" } ] }, { - "@id": "https://w3id.org/dpv/risk#PersonalSafetyEndangerment", + "@id": "https://w3id.org/dpv/risk#RM3x3S1L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -926,15 +1008,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Na66b6d002d3f448981a58870da1a686e" + "@value": "0.11,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -950,45 +1026,86 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Personal Safety Endangerment" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Personal Safety Endangerment" + "@value": "Low Risk (RM3x3 S:1 L:1)" } ] }, { - "@id": "_:Na66b6d002d3f448981a58870da1a686e", + "@id": "https://w3id.org/dpv/risk#RM3x3S2L2", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.44,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Moderate Risk (RM3x3 S:2 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Injury", + "@id": "https://w3id.org/dpv/risk#Extorsion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1013,7 +1130,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N1ef56bb9fadb431ba4c270603c7acdec" + "@id": "_:N78e6085a5a4a4a08adbcdb4af46722d9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1029,13 +1146,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Injury" + "@value": "Something that acts as or causes Extorsion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1046,28 +1166,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Injury" + "@value": "Extorsion" } ] }, { - "@id": "_:N1ef56bb9fadb431ba4c270603c7acdec", + "@id": "_:N78e6085a5a4a4a08adbcdb4af46722d9", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S5L2", + "@id": "https://w3id.org/dpv/risk#RM3x3S3L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1086,7 +1206,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.40,xsd:decimal" + "@value": "0.67,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1102,13 +1222,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1119,91 +1239,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:5 L:2)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#HumanErrors", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N7d9296887d1d4b6ea986d2ad6579a1ec" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#UserRisks" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Human Errors" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Human Errors" - } - ] - }, - { - "@id": "_:N7d9296887d1d4b6ea986d2ad6579a1ec", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "High Risk (RM3x3 S:3 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L5", + "@id": "https://w3id.org/dpv/risk#RM3x3S1L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1222,7 +1263,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.41,xsd:decimal" + "@value": "0.22,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1238,13 +1279,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1255,12 +1296,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:4 L:5)" + "@value": "Low Risk (RM3x3 S:1 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedResourceUse", + "@id": "https://w3id.org/dpv/risk#ConfidentialityBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1285,7 +1326,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd4175f97fd33423f9014c3d690d56fad" + "@id": "_:N0571680fc6554da2a384a2e851d510c0" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1301,13 +1342,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#DataBreach" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Resource Use" + "@value": "Something that acts as or causes Confidentiality Breach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1318,12 +1362,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Resource Use" + "@value": "Confidentiality Breach" } ] }, { - "@id": "_:Nd4175f97fd33423f9014c3d690d56fad", + "@id": "_:N0571680fc6554da2a384a2e851d510c0", "@type": [ "https://schema.org/WebPage" ], @@ -1339,31 +1383,25 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S2L1", + "@id": "https://w3id.org/dpv/risk#Threat", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-02-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.22,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#RiskSource" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1374,33 +1412,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#RiskSource" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low" + "@value": "Risk source event which causes Risk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM3x3 S:2 L:1)" + "@value": "Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L4", + "@id": "https://w3id.org/dpv/risk#ExtremelyLowLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -1410,12 +1448,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.49,xsd:decimal" + "@value": "0.01,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1431,88 +1469,105 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High" + "@value": "Level where Likelihood is Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:6 L:4)" + "@value": "Extremely Low Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#JudicialPenalty", + "@id": "https://w3id.org/dpv/risk#IncidentIdentifier", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@language": "en", - "@value": "accepted" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@language": "en", + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that involves or causes judicial penalties to be paid" + "@value": "Identifier associated with an incident" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Judicial Penalty" + "@value": "Incident Identifier" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentHandlingReport", + "@id": "https://w3id.org/dpv/risk#RM7x7S4L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "0.49,xsd:decimal" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1523,42 +1578,38 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Handling Report" + "@value": "Very High Risk (RM7x7 S:4 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#isVulnerabilityOf", + "@id": "https://w3id.org/dpv/risk#ReductionControl", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" - ], - "http://purl.org/dc/dcam/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Vulnerability" - } + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1572,35 +1623,35 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskControl" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the vulnerability (subject) is associated with indicated context (object)" + "@value": "Control that reduces the likelihood or severity of an event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "is vulnerability of" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@value": "Reduction Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#ModerateRisk", + "@id": "https://w3id.org/dpv/risk#ExposureToHarmfulSpeech", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -1610,12 +1661,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.5,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N95f46ba999c74717949420ed05a75570" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1631,67 +1688,55 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3RiskLevels" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Moderate" + "@value": "Something that acts as or causes Harmful Speech" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk" + "@value": "Exposure to Harmful Speech" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" + "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk#incident-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L3", + "@id": "_:N95f46ba999c74717949420ed05a75570", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/name": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "https://schema.org/url": [ { - "@value": "0.37,xsd:decimal" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityBreach", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -1706,59 +1751,38 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, { - "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" + "@id": "https://w3id.org/dpv/risk#DataBreach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "High Risk (RM7x7 S:6 L:3)" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExposureToHarmfulSpeech", + "@id": "https://w3id.org/dpv/risk#ThreatSource", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-02-14" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "_:Ne595b225e5ee4cc2b2374256ef05fa2e" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1767,77 +1791,44 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Harmful Speech" + "@value": "Source of threat event, including both agent and non-agent sources" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Exposure to Harmful Speech" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0" - } - ] - }, - { - "@id": "_:Ne595b225e5ee4cc2b2374256ef05fa2e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Threat Source" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L7", + "@id": "https://w3id.org/dpv/risk#IncidentDetectionReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.29,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1848,64 +1839,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate" + "@value": "A report describing the detection of a Incident" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:2 L:7)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-jsonld", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/json-ld11/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/application/ld+json" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - JSON-LD serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk.jsonld" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@value": "Incident Detection Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#MonitorConsequence", + "@id": "https://w3id.org/dpv/risk#RM7x7S5L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -1915,7 +1875,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.41,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1931,29 +1896,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MonitorControl" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Consequence" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Consequence" + "@value": "High Risk (RM7x7 S:5 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#DataCorruption", + "@id": "https://w3id.org/dpv/risk#Sabotage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1978,7 +1943,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ncd7b81f0daef4263a47284ebb48b83f6" + "@id": "_:N2fc72d8ce45943bcaad06c0a96aac629" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1989,18 +1954,24 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Corruption of Data" + "@value": "Something that acts as or causes Sabotage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2011,43 +1982,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Corruption" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"Corruption Data\" in DPV 2.0" + "@value": "Sabotage" } ] }, { - "@id": "_:Ncd7b81f0daef4263a47284ebb48b83f6", + "@id": "_:N2fc72d8ce45943bcaad06c0a96aac629", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#incident-status-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IncidentImpactAssessment", + "@id": "https://w3id.org/dpv/risk#RM5x5S1L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -2057,17 +2017,17 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "0.20,xsd:decimal" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv#ImpactAssessment" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2078,38 +2038,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#ImpactAssessment" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "An impact assessment associated with a incident" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Impact Assessment" + "@value": "Low Risk (RM5x5 S:1 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RemedyControl", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.06,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2125,38 +2095,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to remedy consequences of event" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remedy Control" + "@value": "Extremely Low Risk (RM7x7 S:1 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#DetectionControl", + "@id": "https://w3id.org/dpv/risk#RM5x5S4L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2172,100 +2152,55 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to detect event" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Detection Control" + "@value": "Low Risk (RM5x5 S:4 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#hasThreatSource", + "@id": "https://w3id.org/dpv/risk#AuthorisationFailure", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" - ], - "http://purl.org/dc/dcam/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Threat" - } + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk#ThreatSource" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Indicates the threat (subject) has the indicated source (object)" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#core-properties" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "has threat source" + "@value": "2022-08-17" } ], - "https://schema.org/domainIncludes": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk#Threat" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "https://schema.org/rangeIncludes": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/risk#ThreatSource" + "@id": "_:N588812d3250243469d4d5b0cbd82dc9e" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#SecurityAttack", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -2280,13 +2215,19 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes an attack on security with the aim of undermining it" + "@value": "Something that acts as or causes Authorisation Failure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2297,47 +2238,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Security Attack" + "@value": "Authorisation Failure" } ] }, { - "@id": "https://w3id.org/dpv/primer", + "@id": "_:N588812d3250243469d4d5b0cbd82dc9e", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Primer for Data Privacy Vocabulary" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/primer" + "@value": "ENISa Trust Services Security Incidents 2021" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "https://schema.org/url": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3", + "@id": "https://w3id.org/dpv/risk#CopyrightViolation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -2350,6 +2276,17 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N3984b17b1694455793b94c3ad850178d" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -2363,42 +2300,64 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types" + "@value": "Something that acts as or causes Copyright Violation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix 3x3" + "@value": "Copyright Violation" } ] }, { - "@id": "https://w3id.org/dpv/risk#causedByVulnerability", + "@id": "_:N3984b17b1694455793b94c3ad850178d", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" + "https://schema.org/WebPage" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM3x3S2L3", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.67,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2412,35 +2371,35 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the associated context (subject) is caused by the indicated vulnerability (object)" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "caused by vulnerability" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@value": "High Risk (RM3x3 S:2 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S1L3", + "@id": "https://w3id.org/dpv/risk#SourceControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -2450,12 +2409,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.33,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2471,29 +2425,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" + "@value": "Risk Mitigation Measure that controls the Source" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM3x3 S:1 L:3)" + "@value": "Source Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#SystemIntrusion", + "@id": "https://w3id.org/dpv/risk#EquipmentMalfunction", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2518,7 +2472,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N7a5848cbabb14c8ea2d162432eba32f0" + "@id": "_:N53bfad5db8324151841ce01472d06f41" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2534,13 +2488,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Intrusion" + "@value": "Something that acts as or causes Equipment Malfunction" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2551,32 +2508,54 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Intrusion" + "@value": "Equipment Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here equipment refers to physical equipment" } ] }, { - "@id": "_:N7a5848cbabb14c8ea2d162432eba32f0", + "@id": "_:N53bfad5db8324151841ce01472d06f41", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#EnvironmentalRisk", + "@id": "https://w3id.org/dpv/risk#RM5x5S3L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.36,xsd:decimal" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -2591,60 +2570,42 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that have their origin in environment or can affect the environment at large" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Environmental Risk" + "@value": "Moderate Risk (RM5x5 S:3 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#MalwareAttack", + "@id": "https://w3id.org/dpv/risk#hasIncident", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N933b42794d4f41a39ee17bc9b20bf774" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2658,47 +2619,31 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Malware Attack" + "@value": "Indicates an incident is associated with the specified context" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Malware Attack" - } - ] - }, - { - "@id": "_:N933b42794d4f41a39ee17bc9b20bf774", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "has incident" } ], - "https://schema.org/url": [ + "https://schema.org/rangeIncludes": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@id": "https://w3id.org/dpv/risk#Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S3L4", + "@id": "https://w3id.org/dpv/risk#RM7x7S5L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2717,7 +2662,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.48,xsd:decimal" + "@value": "0.71,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2733,13 +2678,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2750,30 +2695,42 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:3 L:4)" + "@value": "Extremely High Risk (RM7x7 S:5 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#AccidentalIncident", + "@id": "https://w3id.org/dpv/risk#core-properties", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S5L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "0.51,xsd:decimal" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2784,33 +2741,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident caused due to accidental actions arising from human or human-controlled situations" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Accidental Incident" + "@value": "Very High Risk (RM7x7 S:5 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L3", + "@id": "https://w3id.org/dpv/risk#PhishingScam", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -2823,9 +2780,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.12,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nb657a11b610f419a86eb9ea4a94e7e37" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2841,33 +2804,52 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" + "@value": "Something that acts as or causes Phishing Scam" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:2 L:3)" + "@value": "Phishing Scam" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S2L3", + "@id": "_:Nb657a11b610f419a86eb9ea4a94e7e37", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#VeryHighSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -2877,12 +2859,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.24,xsd:decimal" + "@value": "0.9,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2898,49 +2880,47 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5SeverityLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Level where Severity is Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:2 L:3)" + "@value": "Very High Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#Harm", + "@id": "https://w3id.org/dpv/risk#ContainmentControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-13" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2956,54 +2936,47 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Harm to humans" + "@value": "Control to contain event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Harm" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept refers to the general abstract notion of harm" + "@value": "Containment Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S5L4", + "@id": "https://w3id.org/dpv/risk#hasThreatSource", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#Threat" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv/risk#ThreatSource" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/created": [ { - "@value": "0.80,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3017,35 +2990,46 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" + "@value": "Indicates the threat (subject) has the indicated source (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:5 L:4)" + "@value": "has threat source" } - ] + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Threat" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#ThreatSource" + } + ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L2", + "@id": "https://w3id.org/dpv/risk#risk-controls-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#LowRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -3055,12 +3039,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.29,xsd:decimal" + "@value": "0.25,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3076,29 +3060,41 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#7RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3RiskLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate" + "@value": "Level where Risk is Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:7 L:2)" + "@value": "Low Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskAssessment", + "@id": "https://w3id.org/dpv/risk#IncidentConcludingReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" @@ -3106,13 +3102,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO 31073:2022 Risk management vocabulary" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3122,7 +3112,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#RiskManagement" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3133,94 +3123,54 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskManagement" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Assessment of risk involving its identification, analysis, and evaluation" + "@value": "A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Assessment" + "@value": "Incident Concluding Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#hasVulnerability", + "@id": "https://w3id.org/dpv/risk#UnauthorisedDataAccess", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Indicates the associated context (subject) has indicated vulnerability (object)" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#core-properties" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "has vulnerability" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@value": "2022-08-17" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ConsequenceControl", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "Harshvardhan J. Pandit" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/source": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@id": "_:N0eacc049940646a99623da2cd6a2d394" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3236,49 +3186,56 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that controls the Consequences" + "@value": "Something that acts as or causes Unauthorised Data Access" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Consequence Control" + "@value": "Unauthorised Data Access" } ] }, { - "@id": "https://w3id.org/dpv/risk#RightsExercisePrevention", + "@id": "_:N0eacc049940646a99623da2cd6a2d394", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IncidentReport", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3286,6 +3243,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#RecordsOfActivities" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -3294,35 +3256,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv#RecordsOfActivities" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Prevent Exercising of Rights" + "@value": "Documented information about an incident, its handling, assessments,and notifications" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Prevent Exercising of Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0" + "@value": "Incident Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseNegotiatingCapacity", + "@id": "https://w3id.org/dpv/risk#CompromiseAccountCredentials", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3347,7 +3303,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd8a232e440f041b496b97da8007b588a" + "@id": "_:N1005943ded74408ea68c811475686000" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3363,13 +3319,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Negotiating Capacity" + "@value": "Something that acts as or causes Account Credentials to be compromised" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3380,58 +3339,46 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Negotiating Capacity" + "@value": "Compromise Account Credentials" } ] }, { - "@id": "_:Nd8a232e440f041b496b97da8007b588a", + "@id": "_:N1005943ded74408ea68c811475686000", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseOpportunity", + "@id": "https://w3id.org/dpv/risk#IntegrityIncident", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-05-19" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "_:N0e6dade5a2814d0f815e1c5dd41f1c65" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3442,45 +3389,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Opportunity" + "@value": "Incident where the integrity of information or system has been affected" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Opportunity" - } - ] - }, - { - "@id": "_:N0e6dade5a2814d0f815e1c5dd41f1c65", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Integrity Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#ComponentFailure", + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3499,13 +3430,22 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Component Failure" + "@value": "Something that acts as or causes Unauthorised Activity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3516,32 +3456,26 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Component Failure" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of" + "@value": "Unauthorised Activity" } ] }, { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels", + "@id": "https://w3id.org/dpv/risk#RiskSource", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/created": [ { - "@value": "Harshvardhan J. Pandit" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/modified": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3549,6 +3483,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#RiskConcept" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -3557,53 +3496,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Severity" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 7 Severity Levels from Extremely High to Extremely Low" + "@value": "The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "7 Severity Levels" + "@value": "Risk Source" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskSource", + "@id": "https://w3id.org/dpv/risk#RM7x7S6L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/contributor": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "0.37,xsd:decimal" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3614,33 +3553,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Source" + "@value": "High Risk (RM7x7 S:6 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#AccidentalMisuse", + "@id": "https://w3id.org/dpv/risk#ModerateSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#Severity" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.5,xsd:decimal" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -3655,38 +3610,66 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UserRisks" + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3SeverityLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Accidental Misuse" + "@value": "Level where Severity is Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Accidental Misuse" + "@value": "Moderate Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#ContainmentControl", + "@id": "https://w3id.org/dpv/risk#BruteForceAuthorisations", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nb75b090fdcda4ec38e841680681bf642" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3702,29 +3685,51 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to contain event" + "@value": "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Containment Control" + "@value": "Brute Force Authorisations" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S2L4", + "@id": "_:Nb75b090fdcda4ec38e841680681bf642", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S4L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3743,7 +3748,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.32,xsd:decimal" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3759,13 +3764,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3776,16 +3781,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:2 L:4)" + "@value": "Extremely Low Risk (RM7x7 S:4 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L1", + "@id": "https://w3id.org/dpv/risk#IncidentHalted", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#IncidentStatus" ], "http://purl.org/dc/terms/contributor": [ { @@ -3795,12 +3800,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.04,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3816,33 +3816,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#IncidentStatus" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "The incident has halted or paused with a high likelihood of resuming or recurring" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:2 L:1)" + "@value": "Incident Halted" } ] }, { - "@id": "https://w3id.org/dpv/risk#LowRisk", + "@id": "https://w3id.org/dpv/risk#RM7x7S6L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -3852,12 +3852,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.25,xsd:decimal" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3873,41 +3873,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3RiskLevels" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" + "@value": "Moderate Risk (RM7x7 S:6 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Sabotage", + "@id": "https://w3id.org/dpv/risk#Payment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3915,13 +3903,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], "http://purl.org/dc/terms/modified": [ @@ -3930,11 +3918,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nddcd9454cd3f48779b8299743d6f1150" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -3948,13 +3931,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Sabotage" + "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3965,28 +3948,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sabotage" - } - ] - }, - { - "@id": "_:Nddcd9454cd3f48779b8299743d6f1150", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Payment" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L1", + "@id": "https://w3id.org/dpv/risk#RM5x5S5L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4005,7 +3972,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.02,xsd:decimal" + "@value": "0.80,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4021,13 +3988,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4038,16 +4005,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:1 L:1)" + "@value": "Very High Risk (RM5x5 S:5 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentTerminated", + "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -4057,7 +4024,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4073,33 +4040,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" + "@id": "https://w3id.org/dpv#Likelihood" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring" + "@value": "Scale with 5 Likelihood Levels from Very High to Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Terminated" + "@value": "5 Likelihood Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#MaliciousCodeAttack", + "@id": "https://w3id.org/dpv/risk#RM7x7S5L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -4112,15 +4079,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N7beef942706b41468112e467b91c5f39" + "@value": "0.10,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4136,49 +4097,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Malicious Code Attack" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Malicious Code Attack" + "@value": "Very Low Risk (RM7x7 S:5 L:1)" } ] }, { - "@id": "_:N7beef942706b41468112e467b91c5f39", + "@id": "https://w3id.org/dpv/risk#RM7x7S6L4", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.49,xsd:decimal" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ViolatingPolicy", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -4193,33 +4154,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes violation of policy which can be either internal or external policy" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Policy" + "@value": "Very High Risk (RM7x7 S:6 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L4", + "@id": "https://w3id.org/dpv/risk#Scam", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -4232,9 +4193,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.41,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nea270aca30b44f5a8cfda049ee8bf631" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4250,84 +4217,82 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + "@value": "Something that acts as or causes Scam" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:5 L:4)" + "@value": "Scam" } ] }, { - "@id": "https://w3id.org/dpv/risk#PhysicalHarm", + "@id": "_:Nea270aca30b44f5a8cfda049ee8bf631", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "accepted" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "https://schema.org/url": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-html", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://www.w3.org/TR/html/" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/format": [ { - "@language": "en", - "@value": "Physical Harm" + "@id": "https://www.iana.org/assignments/media-types/text/html" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L1", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/title": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Risk Concepts - HTML serialiation" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv/risk/risk.html" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@value": "0.10,xsd:decimal" + "@id": "http://www.w3.org/ns/dx/prof/role/specification" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IndividualRisk", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -4340,35 +4305,30 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low" + "@value": "Risks and issues that affect or have the potential to affect specific individuals" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:5 L:1)" + "@value": "Individual Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -4378,7 +4338,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4394,33 +4359,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Likelihood" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 3 Likelihood Levels from High to Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "3 Likelihood Levels" + "@value": "Low Risk (RM7x7 S:2 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#HighSeverity", + "@id": "https://w3id.org/dpv/risk#RM5x5S4L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -4430,12 +4395,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.75,xsd:decimal" + "@value": "0.80,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4451,41 +4416,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3SeverityLevels" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" + "@value": "Very High Risk (RM5x5 S:4 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L7", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4504,7 +4457,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.43,xsd:decimal" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4526,7 +4479,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4537,16 +4490,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:3 L:7)" + "@value": "Low Risk (RM7x7 S:2 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S5L1", + "@id": "https://w3id.org/dpv/risk#5RiskLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -4556,12 +4509,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.20,xsd:decimal" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4577,29 +4525,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv#RiskLevel" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low" + "@value": "Scale with 5 Risk Levels from Very High to Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:5 L:1)" + "@value": "5 Risk Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#Fee", + "@id": "https://w3id.org/dpv/risk#Harm", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4607,13 +4555,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-13" } ], "http://purl.org/dc/terms/modified": [ @@ -4622,12 +4570,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "DGA 2.10" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -4636,18 +4578,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides fees e.g. for using a service" + "@value": "Something that acts as or causes Harm to humans" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4658,16 +4600,38 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Fee" + "@value": "Harm" } - ] + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept refers to the general abstract notion of harm" + } + ] }, { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat", + "@id": "https://w3id.org/dpv/risk#RM5x5S2L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.08,xsd:decimal" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -4682,29 +4646,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Concepts associated with security threats that are likely to originate externally" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "External Security Threat" + "@value": "Very Low Risk (RM5x5 S:2 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#CopyrightViolation", + "@id": "https://w3id.org/dpv/risk#ViolatingEthicsCode", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4729,7 +4693,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N73922ea12cd34584b91e209f306167ae" + "@id": "_:N5971f1bb7e3149b49a4335be11b0926f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4740,7 +4704,7 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ @@ -4751,7 +4715,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Copyright Violation" + "@value": "Something that acts as or causes Violation of Ethics Code" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4762,58 +4726,52 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Copyright Violation" + "@value": "Violating Ethics Code" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0" } ] }, { - "@id": "_:N73922ea12cd34584b91e209f306167ae", + "@id": "_:N5971f1bb7e3149b49a4335be11b0926f", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#CompromiseAccount", + "@id": "https://w3id.org/dpv/risk#IncidentPreliminaryReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-05-19" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "_:N2ad682e6dc844471903bc2f55f3eaae7" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4824,45 +4782,86 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes a compromised account that is then used by the compromiser" + "@value": "A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account" + "@value": "Incident Preliminary Report" } ] }, { - "@id": "_:N2ad682e6dc844471903bc2f55f3eaae7", + "@id": "https://w3id.org/dpv/risk#RM7x7S3L3", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.18,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Low Risk (RM7x7 S:3 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#VulnerabilityCreated", + "@id": "https://w3id.org/dpv/risk#LoseTrust", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4887,7 +4886,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nc0018c079b6b42619d869b3ae63ec70a" + "@id": "_:N95b0eaaa71714fb48e2d00a428e03220" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4903,13 +4902,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#InternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Vulnerability Created" + "@value": "Something that acts as or causes Loss of Trust" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4920,12 +4919,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Vulnerability Created" + "@value": "Lose of Trust" } ] }, { - "@id": "_:Nc0018c079b6b42619d869b3ae63ec70a", + "@id": "_:N95b0eaaa71714fb48e2d00a428e03220", "@type": [ "https://schema.org/WebPage" ], @@ -4941,58 +4940,44 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#EnvironmentalIncident", + "@id": "https://w3id.org/dpv/risk#incident-classes", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk#Incident" - } + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/examples", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@language": "en", - "@value": "accepted" + "@id": "https://www.w3.org/TR/html/" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "Incident caused due to environmental factors outside human controls" + "@value": "Examples for Data Privacy Vocabulary" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/examples" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "Environmental Incident" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L7", + "@id": "https://w3id.org/dpv/risk#RM5x5S5L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -5011,7 +4996,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.71,xsd:decimal" + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5027,13 +5012,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5044,16 +5029,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:5 L:7)" + "@value": "Low Risk (RM5x5 S:5 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#7RiskLevels", + "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemAccess", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -5063,7 +5048,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6fdf74981d95420a82b9c97acf9aa9eb" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5079,33 +5075,55 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskLevel" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 7 Risk Levels from Extremely High to Extremely Low" + "@value": "Something that acts as or causes Unauthorised System Access" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "7 Risk Levels" + "@value": "Unauthorised System Access" } ] }, { - "@id": "https://w3id.org/dpv/risk#RemoveSource", + "@id": "_:N6fdf74981d95420a82b9c97acf9aa9eb", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Coercion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -5115,12 +5133,23 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk#" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nc78302d156fb497aae9594fa63bb9fa7" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5131,33 +5160,52 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SourceControl" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that removes the risk source" + "@value": "Something that acts as or causes Coercion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remove Source" + "@value": "Coercion" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S1L1", + "@id": "_:Nc78302d156fb497aae9594fa63bb9fa7", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Threat Taxonomy 2016" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#VeryHighLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -5167,12 +5215,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.04,xsd:decimal" + "@value": "0.9,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5188,33 +5236,42 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Level where Likelihood is Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:1 L:1)" + "@value": "Very High Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels", + "@id": "https://w3id.org/dpv/risk#RM5x5S3L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -5224,7 +5281,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.60,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5240,50 +5302,69 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Likelihood" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 5 Likelihood Levels from Very High to Very Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "5 Likelihood Levels" + "@value": "Very High Risk (RM5x5 S:3 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L6", + "@id": "https://w3id.org/dpv/risk#Privacy", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@value": "0.37,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Privacy" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#LegalRisk", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -5297,33 +5378,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" + "@value": "Risks and issues that have their basis in legal requirements and enforcement" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:3 L:6)" + "@value": "Legal Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5", + "@id": "https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -5336,6 +5417,17 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N7487c570f8f54358874e08fa38c8f27d" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -5349,33 +5441,58 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types" + "@value": "Something that acts as or causes Unauthorised Access to Premises" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix 5x5" + "@value": "Unauthorised Access to Premises" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S4L4", + "@id": "_:N7487c570f8f54358874e08fa38c8f27d", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Injury", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -5388,9 +5505,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.64,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Na6c5e17bb8ac4135b62412f66dd88460" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5406,33 +5529,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" + "@value": "Something that acts as or causes Injury" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:4 L:4)" + "@value": "Injury" } ] }, { - "@id": "https://w3id.org/dpv/risk#5RiskLevels", + "@id": "_:Na6c5e17bb8ac4135b62412f66dd88460", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RemoveImpact", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -5442,7 +5581,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5458,53 +5597,47 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskLevel" + "@id": "https://w3id.org/dpv/risk#ImpactControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 5 Risk Levels from Very High to Very Low" + "@value": "Control that removes Impact i.e. prevents it from materialising" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "5 Risk Levels" + "@value": "Remove Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L5", + "@id": "https://w3id.org/dpv/risk#IncidentAssessmentReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.61,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5515,48 +5648,43 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" + "@value": "A report describing the assessment of an incident in terms of its effects or impacts" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:6 L:5)" + "@value": "Incident Assessment Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L4", + "@id": "https://w3id.org/dpv/risk#RiskAssessment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-02-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.16,xsd:decimal" + "@language": "en", + "@value": "ISO 31073:2022 Risk management vocabulary" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5564,6 +5692,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#RiskManagement" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -5572,33 +5705,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskManagement" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low" + "@value": "Assessment of risk involving its identification, analysis, and evaluation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:2 L:4)" + "@value": "Risk Assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskMatrix", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAssessment" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -5608,12 +5741,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N812ddb57c74f4cbeb4d59d4bc7907be8" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5629,75 +5762,93 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskAssessment" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other." + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix" + "@value": "Moderate Risk (RM7x7 S:2 L:6)" } ] }, { - "@id": "_:N812ddb57c74f4cbeb4d59d4bc7907be8", + "@id": "https://w3id.org/dpv/risk#ReputationalRisk", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "IEC 31010:2019" + "@id": "https://w3id.org/dpv/risk#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "https://www.iso.org/standard/72140.html" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv#RiskConcept" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Risks and issues that affect the reputation of the organisation" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Reputational Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedDataDisclosure", + "@id": "https://w3id.org/dpv/risk#RiskControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/vocab/vann/example": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@id": "https://w3id.org/dpv/examples#E0071" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "_:Nf415d60c8c8849ba95e5611d481b06ce" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv#RiskMitigationMeasure" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5708,45 +5859,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv#RiskMitigationMeasure" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Disclosure" + "@value": "Control that modifies risk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Disclosure" - } - ] - }, - { - "@id": "_:Nf415d60c8c8849ba95e5611d481b06ce", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Risk Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#Coercion", + "@id": "https://w3id.org/dpv/risk#InterceptCommunications", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -5771,7 +5906,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N61513676426149faae9e58063eb667d8" + "@id": "_:N1f36b972c50f49fb9b474152b57cf474" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5782,10 +5917,13 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -5793,7 +5931,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Coercion" + "@value": "Something that acts as or causes Interception of Communications" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5804,48 +5942,38 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Coercion" + "@value": "Intercept Communications" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0" } ] }, { - "@id": "_:N61513676426149faae9e58063eb667d8", + "@id": "_:N1f36b972c50f49fb9b474152b57cf474", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L5", + "@id": "https://w3id.org/dpv/risk#JudicialPenalty", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.71,xsd:decimal" - } + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -5860,33 +5988,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High" + "@value": "Something that involves or causes judicial penalties to be paid" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:7 L:5)" + "@value": "Judicial Penalty" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolenceAgainstChildren", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -5899,15 +6027,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nb34535276ddd4a56ac18dcc8fc489cbb" + "@value": "0.43,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5923,71 +6045,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Child Violence" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violence against children" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ChildViolence\" in DPV 2.0" - } - ] - }, - { - "@id": "_:Nb34535276ddd4a56ac18dcc8fc489cbb", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "High Risk (RM7x7 S:7 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RightsViolation", + "@id": "https://w3id.org/dpv/risk#RM3x3S3L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6003,55 +6102,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Rights" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0" + "@value": "High Risk (RM3x3 S:3 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#ModerateLikelihood", + "@id": "https://w3id.org/dpv/risk#EnvironmentalRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.5,xsd:decimal" - } + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -6066,45 +6143,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Moderate" + "@value": "Risks and issues that have their origin in environment or can affect the environment at large" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" + "@value": "Environmental Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemAccess", + "@id": "https://w3id.org/dpv/risk#RM7x7S4L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -6117,15 +6182,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N4387faf4bb854435bfdc47ebf666782a" + "@value": "0.33,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6141,49 +6200,89 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised System Access" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised System Access" + "@value": "High Risk (RM7x7 S:4 L:4)" } ] }, { - "@id": "_:N4387faf4bb854435bfdc47ebf666782a", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L4", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.57,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Very High Risk (RM7x7 S:7 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#MonitorRisk", + "@id": "https://w3id.org/dpv/risk#IncidentImpactAssessment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/contributor": [ { @@ -6201,6 +6300,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#ImpactAssessment" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -6209,29 +6313,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MonitorControl" + "@id": "https://w3id.org/dpv#ImpactAssessment" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk" + "@value": "An impact assessment associated with a incident" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Risk" + "@value": "Incident Impact Assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#Spoofing", + "@id": "https://w3id.org/dpv/risk#ErroneousSystemUse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -6256,10 +6360,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N603a4b8fadf24d23ac9c224927644c9d" - }, - { - "@id": "_:N698cebdfba864777b23d25052c4d2493" + "@id": "_:N258e312c37aa4354bed73603ef7a36f6" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6275,16 +6376,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Spoofing" + "@value": "Something that acts as or causes Erroneous System Use" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6295,28 +6393,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Spoofing" - } - ] - }, - { - "@id": "_:N603a4b8fadf24d23ac9c224927644c9d", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Erroneous System Use" } ] }, { - "@id": "_:N698cebdfba864777b23d25052c4d2493", + "@id": "_:N258e312c37aa4354bed73603ef7a36f6", "@type": [ "https://schema.org/WebPage" ], @@ -6332,11 +6414,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#ReduceLikelihood", + "@id": "https://w3id.org/dpv/risk#7SeverityLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -6346,7 +6428,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6362,33 +6444,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReductionControl" + "@id": "https://w3id.org/dpv#Severity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that reduces the likelihood of an event" + "@value": "Scale with 7 Severity Levels from Extremely High to Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reduce Likelihood" + "@value": "7 Severity Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentOngoing", + "@id": "https://w3id.org/dpv/risk#Cryptojacking", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -6398,7 +6480,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N3adf839933da482c89a2828fc9743969" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6414,68 +6507,61 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident is ongoing i.e. still active" + "@value": "Something that acts as or causes Cryptojacking" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Ongoing" + "@value": "Cryptojacking" } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-ttl", + "@id": "_:N3adf839933da482c89a2828fc9743969", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/turtle/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/turtle" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - Turtle serialiation" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk/risk.ttl" + "@value": "ENISA Threat Landscape 2021" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "https://schema.org/url": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" } ] }, { - "@id": "https://w3id.org/dpv/risk#AvailabilityIncident", + "@id": "https://w3id.org/dpv/risk#causedByVulnerability", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" + ], + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Vulnerability" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6483,102 +6569,62 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk#Incident" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Incident" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident where the availability of information or system has been affected" + "@value": "Indicates the associated context (subject) is caused by the indicated vulnerability (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Availability Incident" + "@value": "caused by vulnerability" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk#LegalRisk", + "@id": "https://w3id.org/dpv/risk#risk-levels-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S1L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv#RiskConcept" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Risks and issues that have their basis in legal requirements and enforcement" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Legal Risk" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#HighLikelihood", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.75,xsd:decimal" + "@value": "0.14,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6594,102 +6640,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Level where Likelihood is High" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "High Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#isExploitedBy", - "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" - ], - "http://purl.org/dc/dcam/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Vulnerability" - } - ], - "http://purl.org/dc/dcam/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Threat" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the vulnerability (subject) is exploited by the indicated threat (object)" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "is exploited by" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Vulnerability" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Threat" + "@value": "Low Risk (RM7x7 S:1 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#CompromiseAccountCredentials", + "@id": "https://w3id.org/dpv/risk#LoseCredibility", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -6714,7 +6687,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nf877665a169e4a7eac29964fc15db245" + "@id": "_:N2c068c379d9b4c2b8da0937ad8be6a81" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6730,13 +6703,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Account Credentials to be compromised" + "@value": "Something that acts as or causes Loss of Credibility" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6747,28 +6720,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account Credentials" + "@value": "Lose of Credibility" } ] }, { - "@id": "_:Nf877665a169e4a7eac29964fc15db245", + "@id": "_:N2c068c379d9b4c2b8da0937ad8be6a81", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L1", + "@id": "https://w3id.org/dpv/risk#RM5x5S2L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -6787,7 +6760,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.12,xsd:decimal" + "@value": "0.40,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6803,13 +6776,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6820,16 +6793,15 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:6 L:1)" + "@value": "High Risk (RM5x5 S:2 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L7", + "@id": "https://w3id.org/dpv/risk#IncidentStatus", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/contributor": [ { @@ -6839,12 +6811,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-02-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/vocab/vann/example": [ { - "@value": "0.14,xsd:decimal" + "@id": "https://w3id.org/dpv/examples#E0069" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6852,6 +6824,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#Status" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -6860,49 +6837,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv#Status" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low" + "@value": "Status associated with an incident" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:1 L:7)" + "@value": "Incident Status" } ] }, { - "@id": "https://w3id.org/dpv/risk#VeryHighRisk", + "@id": "https://w3id.org/dpv/risk#ComponentMalfunction", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.9,xsd:decimal" - } + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -6917,42 +6878,42 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" }, { - "@id": "https://w3id.org/dpv/risk#5RiskLevels" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Very High" + "@value": "Something that acts as or causes Component Malfunction" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk" + "@value": "Component Malfunction" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" + "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of" } ] }, { - "@id": "https://w3id.org/dpv/risk#SystemMalfunction", + "@id": "https://w3id.org/dpv/risk#RM7x7S3L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -6965,15 +6926,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N1c2325e64024454ebc2e79f9e388cf3b" + "@value": "0.06,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6989,51 +6944,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Malfunction" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Malfunction" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here system refers to both hardware and software systems" - } - ] - }, - { - "@id": "_:N1c2325e64024454ebc2e79f9e388cf3b", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Extremely Low Risk (RM7x7 S:3 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L5", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -7052,7 +6985,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.31,xsd:decimal" + "@value": "0.71,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7074,7 +7007,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7085,51 +7018,36 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:3 L:5)" + "@value": "Extremely High Risk (RM7x7 S:7 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-html", + "@id": "https://w3id.org/dpv/risk#RiskManagement", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ + "http://purl.org/dc/terms/created": [ { - "@value": "Risk Concepts - HTML serialiation" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-06-12" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/risk/risk.html" + "@language": "en", + "@value": "ISO 31073:2022 Risk management vocabulary" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/specification" + "@id": "https://w3id.org/dpv/risk#" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#AvailabilityBreach", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7138,23 +7056,30 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/risk#DataBreach" + "@language": "en", + "@value": "Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Risk Management" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S3L2", + "@id": "https://w3id.org/dpv/risk#ExtremelyHighLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -7164,12 +7089,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.24,xsd:decimal" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7185,33 +7110,39 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" + "@value": "Level where Likelihood is Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:3 L:2)" + "@value": "Extremely High Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#Extorsion", + "@id": "https://w3id.org/dpv/risk#ExtremelyLowRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -7221,18 +7152,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N40f94dff19814aa6ae7d3074eb3409d8" + "@value": "0.01,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7248,49 +7173,39 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#7RiskLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Extorsion" + "@value": "Level where Risk is Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extorsion" - } - ] - }, - { - "@id": "_:N40f94dff19814aa6ae7d3074eb3409d8", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "Extremely Low Risk" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#RemoveConsequence", + "@id": "https://w3id.org/dpv/risk#RM7x7S5L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -7300,7 +7215,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.61,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7316,33 +7236,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConsequenceControl" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that removes Consequence i.e. prevents it from materialising" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remove Consequence" + "@value": "Extremely High Risk (RM7x7 S:5 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L6", + "@id": "https://w3id.org/dpv/risk#UnauthorisedDataDisclosure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -7355,9 +7275,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.86,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N7c66233cabb64c2486ae612a1ff6b01d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7373,55 +7299,52 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High" + "@value": "Something that acts as or causes Unauthorised Data Disclosure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:7 L:6)" + "@value": "Unauthorised Data Disclosure" } ] }, { - "@id": "https://w3id.org/dpv/risk#PsychologicalHarm", + "@id": "_:N7c66233cabb64c2486ae612a1ff6b01d", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/modified": [ + "https://schema.org/name": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/source": [ + "https://schema.org/url": [ { - "@id": "_:N903ec696d7504183af4ba63f3f295e8e" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -7436,13 +7359,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Psychological Harm" + "@value": "Risks and issues that arise during operational processes" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7453,46 +7376,26 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Psychological Harm" - } - ] - }, - { - "@id": "_:N903ec696d7504183af4ba63f3f295e8e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Operational Security Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#exploitsVulnerability", + "@id": "https://w3id.org/dpv/risk#RemoveConsequence", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" - ], - "http://purl.org/dc/dcam/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Threat" - } + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7506,36 +7409,31 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ConsequenceControl" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the threat (subject) exploits the indicated vulnerability (object)" + "@value": "Control that removes Consequence i.e. prevents it from materialising" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "exploits vulnerability" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Threat" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@value": "Remove Consequence" } ] }, { - "@id": "https://w3id.org/dpv/risk#ConfidentialityIncident", + "@id": "https://w3id.org/dpv/risk#CrossBorderIncident", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" @@ -7570,7 +7468,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident where the confidentiality of information or system has been affected" + "@value": "Incident involving cross-border or multiple jurisdictions" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7581,12 +7479,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confidentiality Incident" + "@value": "Cross-Border Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S2L5", + "@id": "https://w3id.org/dpv/risk#RM5x5S1L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -7605,7 +7503,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.40,xsd:decimal" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7627,7 +7525,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7638,51 +7536,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:2 L:5)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IndividualRisk", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Risks and issues that affect or have the potential to affect specific individuals" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Individual Risk" + "@value": "Very Low Risk (RM5x5 S:1 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExtremelyLowRisk", + "@id": "https://w3id.org/dpv/risk#LoseReputation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -7692,75 +7555,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.01,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Level where Risk is Extremely Low" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Extremely Low Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L1", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/modified": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-08-16" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.14,xsd:decimal" + "@id": "_:N90d89ca8a8594ecabee31205aee25395" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7776,245 +7582,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low" + "@value": "Something that acts as or causes Loss of Reputation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:7 L:1)" + "@value": "Lose of Reputation" } ] }, { - "@id": "https://w3id.org/dpv/risk", + "@id": "_:N90d89ca8a8594ecabee31205aee25395", "@type": [ - "http://www.w3.org/2002/07/owl#Ontology", - "http://www.w3.org/ns/dx/prof/Profile" - ], - "http://purl.org/dc/terms/bibliographicCitation": [ - { - "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" - } - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@value": "http://www.w3.org/2000/01/rdf-schema" - }, - { - "@value": "http://www.w3.org/2004/02/skos/core" - } - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - }, - { - "@value": "Georg P. Krog" - }, - { - "@value": "Rob Brennan" - }, - { - "@value": "Beatriz Esteves" - }, - { - "@value": "Axel Polleres" - }, - { - "@value": "Fajar Ekaputra" - }, - { - "@value": "Delaram Golpayegani" - }, - { - "@value": "Julian Flake" - }, - { - "@value": "Julio Fernandez" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@language": "en", - "@value": "2022-08-14" - } - ], - "http://purl.org/dc/terms/creator": [ - { - "@language": "en", - "@value": "Harshvardhan J. Pandit" - }, - { - "@language": "en", - "@value": "Georg P. Krog" - }, - { - "@language": "en", - "@value": "Paul Ryan" - }, - { - "@language": "en", - "@value": "Rob Brennan" - }, - { - "@language": "en", - "@value": "Delaram Golpayegani" - }, - { - "@language": "en", - "@value": "Beatriz Esteves" - }, - { - "@language": "en", - "@value": "Julian Flake" - } - ], - "http://purl.org/dc/terms/description": [ - { - "@language": "en", - "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" - } - ], - "http://purl.org/dc/terms/identifier": [ - { - "@value": "https://w3id.org/dpv/risk" - } - ], - "http://purl.org/dc/terms/issued": [ - { - "@language": "en", - "@value": "2022-08-14" - } - ], - "http://purl.org/dc/terms/license": [ - { - "@id": "https://www.w3.org/copyright/document-license-2023/" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@language": "en", - "@value": "2024-07-13" - } - ], - "http://purl.org/dc/terms/publisher": [ - { - "@id": "https://www.w3.org/" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "https://www.w3.org/groups/cg/dpvcg/" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@language": "en", - "@value": "Risk Concepts" - } - ], - "http://purl.org/ontology/bibo/doi": [ - { - "@value": "10.5281/zenodo.12505841" - } - ], - "http://purl.org/ontology/bibo/status": [ - { - "@value": "http://purl.org/ontology/bibo/status/published" - } - ], - "http://purl.org/vocab/vann/preferredNamespacePrefix": [ - { - "@value": "risk" - } - ], - "http://purl.org/vocab/vann/preferredNamespaceUri": [ - { - "@value": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#Label": [ - { - "@language": "en", - "@value": "RISK" - } - ], - "http://www.w3.org/2002/07/owl#versionIRI": [ - { - "@id": "https://w3id.org/dpv/2.1-dev/risk" - } - ], - "http://www.w3.org/2002/07/owl#versionInfo": [ - { - "@value": "2.1-dev" - } - ], - "http://www.w3.org/ns/dx/prof/hasResource": [ - { - "@id": "https://w3id.org/dpv/primer" - }, - { - "@id": "https://w3id.org/dpv/guides" - }, - { - "@id": "https://w3id.org/dpv/examples" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-html" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-rdf" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-ttl" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-n3" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-jsonld" - } - ], - "http://www.w3.org/ns/dx/prof/isProfileOf": [ - { - "@id": "http://www.w3.org/2000/01/rdf-schema#" - }, - { - "@id": "http://www.w3.org/2004/02/skos/core#" - }, - { - "@id": "https://w3id.org/dpv" - } + "https://schema.org/WebPage" ], - "http://xmlns.com/foaf/0.1/logo": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/media/logo.png" + "@value": "ISO/IEC 27005:2018" } ], - "https://schema.org/version": [ + "https://schema.org/url": [ { - "@value": "2.1-dev" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingLegalObligation", + "@id": "https://w3id.org/dpv/risk#ExtremelyHighRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -8024,18 +7634,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Naf3bb0ebde894641a8c0a69545e7f6cc" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8046,56 +7650,40 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#7RiskLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Legal Obligations" + "@value": "Level where Risk is Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Legal Obligations" + "@value": "Extremely High Risk" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0" - } - ] - }, - { - "@id": "_:Naf3bb0ebde894641a8c0a69545e7f6cc", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#Scam", + "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -8120,7 +7708,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N498890541a5449e290f0aea406ea5090" + "@id": "_:Nc4c391b305be479eb0e623d887a478ac" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8135,6 +7723,9 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -8142,7 +7733,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Scam" + "@value": "Something that acts as or causes Unauthorised Code Disclosure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8153,88 +7744,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Scam" + "@value": "Unauthorised Code Disclosure" } ] }, { - "@id": "_:N498890541a5449e290f0aea406ea5090", + "@id": "_:Nc4c391b305be479eb0e623d887a478ac", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RiskControl", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples#E0071" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv#RiskMitigationMeasure" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv#RiskMitigationMeasure" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Control that modifies risk" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Risk Control" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#EquipmentFailure", + "@id": "https://w3id.org/dpv/risk#RM5x5S1L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -8247,15 +7782,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nc281053cb7ff4095b5eef42624c4ff46" + "@value": "0.04,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8271,51 +7800,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Equipment Failure" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Equipment Failure" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here equipment refers to physical equipment" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low" } - ] - }, - { - "@id": "_:Nc281053cb7ff4095b5eef42624c4ff46", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "Very Low Risk (RM5x5 S:1 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#ChangeConsequence", + "@id": "https://w3id.org/dpv/risk#MonitorImpact", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -8345,13 +7852,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConsequenceControl" + "@id": "https://w3id.org/dpv/risk#MonitorControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that changes Consequence" + "@value": "Control that monitors a Risk Impact" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8362,12 +7869,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Change Consequence" + "@value": "Monitor Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S2L2", + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -8384,11 +7891,6 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.44,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -8402,13 +7904,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#RiskMatrix" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8419,12 +7921,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM3x3 S:2 L:2)" + "@value": "Risk Matrix 5x5" } ] }, { - "@id": "https://w3id.org/dpv/risk#ComponentMalfunction", + "@id": "https://w3id.org/dpv/risk#UserRisks", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -8443,13 +7945,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Component Malfunction" + "@value": "Concepts associated with risks that arise due to User or Human use" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8460,22 +7962,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Component Malfunction" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of" + "@value": "User Risks" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S3L3", + "@id": "https://w3id.org/dpv/risk#IncidentStatusUnknown", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#IncidentStatus" ], "http://purl.org/dc/terms/contributor": [ { @@ -8485,12 +7981,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.36,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8506,29 +7997,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#IncidentStatus" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "The status of a incident is unknown" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:3 L:3)" + "@value": "Incident Status Unknown" } ] }, { - "@id": "https://w3id.org/dpv/risk#FinancialImpact", + "@id": "https://w3id.org/dpv/risk#SecurityAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -8547,13 +8038,22 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Things that cause or have the potential to impact financial resources" + "@value": "Something that acts as or causes an attack on security with the aim of undermining it" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8564,20 +8064,26 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Impact" + "@value": "Security Attack" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentReport", + "@id": "https://w3id.org/dpv/risk#3SeverityLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#Severity" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8585,11 +8091,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv#RecordsOfActivities" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -8598,29 +8099,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RecordsOfActivities" + "@id": "https://w3id.org/dpv#Severity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Documented information about an incident, its handling, assessments,and notifications" + "@value": "Scale with 3 Severity Levels from High to Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Report" + "@value": "3 Severity Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#MonitorControl", + "@id": "https://w3id.org/dpv/risk#HaltSource", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -8650,13 +8151,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#SourceControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that uses controls to monitor events" + "@value": "Control that halts the risk source or prevents it from materialising" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8667,22 +8168,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Control" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised." + "@value": "Halt Source" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L3", + "@id": "https://w3id.org/dpv/risk#CompromiseAccount", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -8695,9 +8190,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.24,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N252928e4ed0f4c6ea83876f7fb2c3d78" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8713,33 +8214,58 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" + "@value": "Something that acts as or causes a compromised account that is then used by the compromiser" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:4 L:3)" + "@value": "Compromise Account" } ] }, { - "@id": "https://w3id.org/dpv/risk#AvoidSource", + "@id": "_:N252928e4ed0f4c6ea83876f7fb2c3d78", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#VeryHighRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -8749,7 +8275,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.9,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8765,29 +8296,99 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SourceControl" + "@id": "https://w3id.org/dpv/risk#7RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5RiskLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that avoids the risk source" + "@value": "Level where Risk is Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Avoid Source" + "@value": "Very High Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedDataModification", + "@id": "https://w3id.org/dpv/risk#exploitsVulnerability", + "@type": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" + ], + "http://purl.org/dc/dcam/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Threat" + } + ], + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Vulnerability" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Indicates the threat (subject) exploits the indicated vulnerability (object)" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#core-properties" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "exploits vulnerability" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Threat" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Vulnerability" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#PersonalSafetyEndangerment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -8812,7 +8413,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Naa83e8f3fb5e4e9a88398292112d68f3" + "@id": "_:Na783f8da28594e8794173492db9ecac9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8828,13 +8429,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Modification" + "@value": "Something that acts as or causes Personal Safety Endangerment" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8845,38 +8446,48 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Modification" + "@value": "Personal Safety Endangerment" } ] }, { - "@id": "_:Naa83e8f3fb5e4e9a88398292112d68f3", + "@id": "_:Na783f8da28594e8794173492db9ecac9", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity", + "@id": "https://w3id.org/dpv/risk#EnvironmentalIncident", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#Incident" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -8885,29 +8496,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Activity" + "@value": "Incident caused due to environmental factors outside human controls" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Activity" + "@value": "Environmental Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L1", + "@id": "https://w3id.org/dpv/risk#RM5x5S3L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -8926,7 +8537,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.06,xsd:decimal" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8942,13 +8553,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8959,12 +8570,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:3 L:1)" + "@value": "Moderate Risk (RM5x5 S:3 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#IllegalDataProcessing", + "@id": "https://w3id.org/dpv/risk#Detriment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -8972,13 +8583,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-23" } ], "http://purl.org/dc/terms/modified": [ @@ -8987,11 +8598,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N83bd5296b4d94804a73f0e0518c39495" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -9011,7 +8617,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Illegal Processing of Data" + "@value": "Something that acts as or causes Detriment" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -9022,38 +8628,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Illegal Data Processing" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N83bd5296b4d94804a73f0e0518c39495", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Detriment" } ] }, { - "@id": "https://w3id.org/dpv/risk#ConfidentialityBreach", + "@id": "https://w3id.org/dpv/risk#RM7x7S5L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -9066,15 +8650,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N804ad242900c474395dd117c74dace8e" + "@value": "0.31,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9090,40 +8668,24 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#DataBreach" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Confidentiality Breach" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confidentiality Breach" - } - ] - }, - { - "@id": "_:N804ad242900c474395dd117c74dace8e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Moderate Risk (RM7x7 S:5 L:3)" } ] }, @@ -9163,11 +8725,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#VeryHighLikelihood", + "@id": "https://w3id.org/dpv/risk#Blackmail", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -9177,12 +8739,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.9,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N72e00e4999f548eb88bf909311860524" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9198,58 +8766,62 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" }, { - "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Very High" + "@value": "Something that acts as or causes Blackmail" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Likelihood" + "@value": "Blackmail" } + ] + }, + { + "@id": "_:N72e00e4999f548eb88bf909311860524", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#Compensation", + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9265,33 +8837,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv#Likelihood" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms" + "@value": "Scale with 7 Likelihood Levels from Extremely High to Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compensation" + "@value": "7 Likelihood Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -9301,13 +8873,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.04,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9323,55 +8894,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Non-Material Damage" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Non-Material Damage" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" + "@value": "Extremely Low Risk (RM7x7 S:2 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Misuse", + "@id": "https://w3id.org/dpv/risk#HighLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Delaram Golpayegani" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-06-11" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.75,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9387,33 +8951,45 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UserRisks" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Misuse" + "@value": "Level where Likelihood is High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Misuse" + "@value": "High Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#ImpactControl", + "@id": "https://w3id.org/dpv/risk#RM3x3S1L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -9423,7 +8999,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.33,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9439,37 +9020,42 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that controls Impacts" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Impact Control" + "@value": "Moderate Risk (RM3x3 S:1 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentConcludingReport", + "@id": "https://w3id.org/dpv/risk#hasControl", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" + ], + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#RiskControl" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9477,66 +9063,75 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk#IncidentReport" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#IncidentReport" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known" + "@value": "Indicates the use of specified control" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Concluding Report" + "@value": "has control" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#RiskControl" } ] }, { - "@id": "https://w3id.org/dpv/risk#core-properties", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#CrossBorderIncident", + "@id": "https://w3id.org/dpv/risk#DataBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk#" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "_:N0353966748ad43cc9b9c03081ec6b6f9" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples#E0069" + }, + { + "@id": "https://w3id.org/dpv/examples#E0071" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9547,33 +9142,58 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#SecurityBreach" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident involving cross-border or multiple jurisdictions" + "@value": "Something that acts as or causes Data Breach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cross-Border Incident" + "@value": "Data Breach" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExtremelyHighRisk", + "@id": "_:N0353966748ad43cc9b9c03081ec6b6f9", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#MalwareAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -9583,12 +9203,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.99,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6fb9cc1510c4401a9c582949b7a8c8b7" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9604,60 +9230,74 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Extremely High" + "@value": "Something that acts as or causes Malware Attack" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" + "@value": "Malware Attack" } ] }, { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes", + "@id": "_:N6fb9cc1510c4401a9c582949b7a8c8b7", "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L6", + "@id": "https://w3id.org/dpv/risk#RightsExercisePrevention", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.12,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9673,29 +9313,35 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low" + "@value": "Something that acts as or causes Prevent Exercising of Rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:1 L:6)" + "@value": "Prevent Exercising of Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S4L5", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -9714,7 +9360,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.80,xsd:decimal" + "@value": "0.04,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9730,13 +9376,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -9747,12 +9393,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:4 L:5)" + "@value": "Extremely Low Risk (RM7x7 S:1 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedDataAccess", + "@id": "https://w3id.org/dpv/risk#SystemFailure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -9777,7 +9423,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nc799e152712d4ee48d59c2a1366fca7f" + "@id": "_:Nd794c9a0064e4fe6bb3a0ebd38859b9b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9793,13 +9439,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Access" + "@value": "Something that acts as or causes System Failure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -9810,32 +9459,38 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Access" + "@value": "System Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here system refers to both hardware and software systems" } ] }, { - "@id": "_:Nc799e152712d4ee48d59c2a1366fca7f", + "@id": "_:Nd794c9a0064e4fe6bb3a0ebd38859b9b", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L3", + "@id": "https://w3id.org/dpv/risk#IncidentMitigated", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#IncidentStatus" ], "http://purl.org/dc/terms/contributor": [ { @@ -9845,12 +9500,53 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-02-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.06,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#IncidentStatus" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#incident-status-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Incident Mitigated" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IncidentHandlingReport", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9858,6 +9554,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#IncidentReport" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -9866,29 +9567,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low" + "@value": "A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:1 L:3)" + "@value": "Incident Handling Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#SecurityBreach", + "@id": "https://w3id.org/dpv/risk#DataCorruption", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -9913,7 +9614,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nee086e9da9f643e2837c115c27f1cabc" + "@id": "_:N8aaec0d1fefb4744abcf3099509b1988" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9924,10 +9625,13 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, { "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } @@ -9935,7 +9639,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Security Breach" + "@value": "Something that acts as or causes Corruption of Data" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -9946,12 +9650,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Security Breach" + "@value": "Data Corruption" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"Corruption Data\" in DPV 2.0" } ] }, { - "@id": "_:Nee086e9da9f643e2837c115c27f1cabc", + "@id": "_:N8aaec0d1fefb4744abcf3099509b1988", "@type": [ "https://schema.org/WebPage" ], @@ -9967,7 +9677,38 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemModification", + "@id": "https://w3id.org/dpv/risk#serialisation-rdf", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - RDF/XML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.rdf" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Misuse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -9975,13 +9716,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Delaram Golpayegani" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-06-11" } ], "http://purl.org/dc/terms/modified": [ @@ -9990,11 +9731,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N0c47798cd08a44d790a99ee3c58dcfb9" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -10008,13 +9744,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised System Modification" + "@value": "Something that acts as or causes Misuse" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10025,83 +9761,89 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised System Modification" + "@value": "Misuse" } ] }, { - "@id": "_:N0c47798cd08a44d790a99ee3c58dcfb9", + "@id": "https://w3id.org/dpv/risk#IncidentTerminated", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#IncidentStatus" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/guides", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.w3.org/TR/html/" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@value": "Guides for Data Privacy Vocabulary" + "@id": "https://w3id.org/dpv/risk#IncidentStatus" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/guides" + "@language": "en", + "@value": "The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Incident Terminated" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentSuspectedReport", + "@id": "https://w3id.org/dpv/risk#SocialDisadvantage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-19" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk#" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10112,33 +9854,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the suspicion of an incident in the past or occuring" + "@value": "Something that acts as or causes Social Disadvantage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Suspected Report" + "@value": "Social Disadvantage" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentConcluded", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -10148,7 +9890,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.14,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10164,33 +9911,68 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Concluded" + "@value": "Low Risk (RM7x7 S:7 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7", + "@id": "https://w3id.org/dpv/risk#PhysicalHarm", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#IndividualRisk" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Physical Harm" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Reidentification", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -10200,7 +9982,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-19" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10216,29 +10004,38 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types" + "@value": "Something that acts as or causes Re-identification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix 7x7" + "@value": "Re-identification" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification" } ] }, { - "@id": "https://w3id.org/dpv/risk#SystemFailure", + "@id": "https://w3id.org/dpv/risk#Spoofing", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -10263,7 +10060,10 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ndb0e0e85d6ad4dabbf9efc7a0f2cb59a" + "@id": "_:N539160303302464aa341bdfa53068f22" + }, + { + "@id": "_:N0085b3ac0b474cf1a64eccdff3718c8d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10278,6 +10078,15 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + }, { "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } @@ -10285,7 +10094,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Failure" + "@value": "Something that acts as or causes Spoofing" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10295,35 +10104,45 @@ ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@language": "en", - "@value": "System Failure" + "@language": "en", + "@value": "Spoofing" + } + ] + }, + { + "@id": "_:N539160303302464aa341bdfa53068f22", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Here system refers to both hardware and software systems" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "_:Ndb0e0e85d6ad4dabbf9efc7a0f2cb59a", + "@id": "_:N0085b3ac0b474cf1a64eccdff3718c8d", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeModification", + "@id": "https://w3id.org/dpv/risk#Compensation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -10331,13 +10150,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], "http://purl.org/dc/terms/modified": [ @@ -10346,11 +10165,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N8ae12eb2b96a4c7e97a8739ee00ffe80" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -10364,13 +10178,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Modification" + "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10381,46 +10195,40 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Modification" + "@value": "Compensation" } ] }, { - "@id": "_:N8ae12eb2b96a4c7e97a8739ee00ffe80", + "@id": "https://w3id.org/dpv/risk#refersToRisk", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" ], - "https://schema.org/name": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@id": "https://w3id.org/dpv#Incident" } ], - "https://schema.org/url": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@id": "https://w3id.org/dpv#Risk" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#DeliberateIncident", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/vocab/vann/example": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/examples#E0069" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10429,45 +10237,45 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Incident" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident caused due to deliberate actions of a human" + "@value": "Indicates the incident (subject) is a materialisation of the indicated risk (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Deliberate Incident" + "@value": "refers to risk" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv#Incident" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv#Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentStatusUnknown", + "@id": "https://w3id.org/dpv/risk#RemedyControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10483,33 +10291,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The status of a incident is unknown" + "@value": "Control to remedy consequences of event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Status Unknown" + "@value": "Remedy Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#ModerateSeverity", + "@id": "https://w3id.org/dpv/risk#ViolatingStatutoryObligations", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -10519,12 +10327,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.5,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Ne3511d0b904a403e93b1538888ad1023" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10535,61 +10349,60 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3SeverityLevels" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Moderate" + "@value": "Something that acts as or causes Violation of Statutory Obligations" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Severity" + "@value": "Violation of Statutory Obligations" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" + "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentMitigated", + "@id": "_:Ne3511d0b904a403e93b1538888ad1023", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IndividualHealthSafety", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -10604,42 +10417,31 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Mitigated" + "@value": "Individual Health & Safety" } ] }, { - "@id": "https://w3id.org/dpv/risk#hasControl", + "@id": "https://w3id.org/dpv/risk#DeliberateIncident", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" - ], - "http://purl.org/dc/dcam/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#RiskControl" - } + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10647,51 +10449,50 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#Incident" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#Incident" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the use of specified control" + "@value": "Incident caused due to deliberate actions of a human" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has control" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@value": "Deliberate Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#ReduceSeverity", + "@id": "https://w3id.org/dpv/risk#Vulnerability", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10699,41 +10500,41 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@language": "en", - "@value": "accepted" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/risk#ReductionControl" + "@language": "en", + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that reduces the severity of an event" + "@value": "Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reduce Severity" + "@value": "Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S1L4", + "@id": "https://w3id.org/dpv/risk#ShareRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -10743,12 +10544,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.16,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10764,33 +10560,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" + "@value": "Risk Mitigation Measure that shares Risk e.g. amongst stakeholders" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:1 L:4)" + "@value": "Share Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S2L3", + "@id": "https://w3id.org/dpv/risk#MonitorConsequence", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -10800,12 +10596,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.67,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10821,47 +10612,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#MonitorControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + "@value": "Control that monitors a Risk Consequence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM3x3 S:2 L:3)" + "@value": "Monitor Consequence" } ] }, { - "@id": "https://w3id.org/dpv/risk#Threat", + "@id": "https://w3id.org/dpv/risk#HighRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskLevel" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-18" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "0.75,xsd:decimal" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#RiskSource" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10872,48 +10669,50 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskSource" + "@id": "https://w3id.org/dpv/risk#7RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3RiskLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk source event which causes Risk" + "@value": "Level where Risk is High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Threat" + "@value": "High Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S3L2", + "@id": "https://w3id.org/dpv/risk#RecoveryControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.67,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10929,43 +10728,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + "@value": "Control to recover from event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM3x3 S:3 L:2)" + "@value": "Recovery Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskManagement", + "@id": "https://w3id.org/dpv/risk#RM7x7S3L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-06-12" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@language": "en", - "@value": "ISO 31073:2022 Risk management vocabulary" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10973,41 +10777,41 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Management" + "@value": "Very Low Risk (RM7x7 S:3 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Reidentification", + "@id": "https://w3id.org/dpv/risk#ReduceSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -11017,13 +10821,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11039,35 +10837,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#ReductionControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Re-identification" + "@value": "Control that reduces the severity of an event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Re-identification" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification" + "@value": "Reduce Severity" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentMitigationMeasure", + "@id": "https://w3id.org/dpv/risk#ConfidentialityIncident", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" @@ -11085,7 +10877,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv#RiskMitigationMeasure" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11096,13 +10888,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskMitigationMeasure" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again" + "@value": "Incident where the confidentiality of information or system has been affected" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11113,32 +10905,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Mitigation Measure" + "@value": "Confidentiality Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L4", + "@id": "https://w3id.org/dpv/risk#AccidentalMisuse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.57,xsd:decimal" - } + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -11153,29 +10929,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High" + "@value": "Accidental Misuse" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:7 L:4)" + "@value": "Accidental Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L2", + "@id": "https://w3id.org/dpv/risk#RM7x7S6L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -11194,7 +10970,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.04,xsd:decimal" + "@value": "0.73,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11216,7 +10992,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11227,12 +11003,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:1 L:2)" + "@value": "Extremely High Risk (RM7x7 S:6 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S4L2", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -11251,7 +11027,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.32,xsd:decimal" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11267,13 +11043,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11284,47 +11060,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:4 L:2)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IndividualHealthSafety", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Individual Health & Safety" + "@value": "Very Low Risk (RM7x7 S:2 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#PhysicalAssault", + "@id": "https://w3id.org/dpv/risk#UnauthorisedReidentification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -11332,13 +11073,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-19" } ], "http://purl.org/dc/terms/modified": [ @@ -11347,11 +11088,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N4414613afa8c4456b9a9b6c3f17a7a0c" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -11365,13 +11101,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Physical Assault" + "@value": "Something that acts as or causes Unauthorised Re-Identification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11382,28 +11121,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Physical Assault" - } - ] - }, - { - "@id": "_:N4414613afa8c4456b9a9b6c3f17a7a0c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Unauthorised Re-Identification" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure", + "@id": "https://w3id.org/dpv/risk#PublicOrderBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -11428,7 +11151,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb2d6659136cf4d2fa881ae5798bf0e58" + "@id": "_:N1d102af8ecd94ce3a875a9a2a7e78bcc" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11444,13 +11167,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Information Disclosure" + "@value": "Something that acts as or causes Public Order Breach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11461,28 +11184,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Information Disclosure" + "@value": "Public Order Breach" } ] }, { - "@id": "_:Nb2d6659136cf4d2fa881ae5798bf0e58", + "@id": "_:N1d102af8ecd94ce3a875a9a2a7e78bcc", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#RightsImpact", + "@id": "https://w3id.org/dpv/risk#UnwantedDataDeletion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -11507,7 +11230,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N4e0b95db2d414e7588f607d2edf6902e" + "@id": "_:Nde382e9a51c445d69476b298827b1cbe" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11523,16 +11246,19 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" }, { - "@id": "https://w3id.org/dpv#Impact" + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Impact to Rights" + "@value": "Something that acts as or causes Unwanted Data Deletion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11543,18 +11269,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Impact to Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ImpactToRights\" in DPV 2.0" + "@value": "Unwanted Data Deletion" } ] }, { - "@id": "_:N4e0b95db2d414e7588f607d2edf6902e", + "@id": "_:Nde382e9a51c445d69476b298827b1cbe", "@type": [ "https://schema.org/WebPage" ], @@ -11570,11 +11290,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#DataBreach", + "@id": "https://w3id.org/dpv/risk#ReduceLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -11584,26 +11304,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N82834c9f1ecf4644ab2d9343a1169c62" - } - ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples#E0069" - }, - { - "@id": "https://w3id.org/dpv/examples#E0071" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11619,45 +11320,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SecurityBreach" + "@id": "https://w3id.org/dpv/risk#ReductionControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Data Breach" + "@value": "Control that reduces the likelihood of an event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Breach" - } - ] - }, - { - "@id": "_:N82834c9f1ecf4644ab2d9343a1169c62", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Reduce Likelihood" } ] }, { - "@id": "https://w3id.org/dpv/risk#Detriment", + "@id": "https://w3id.org/dpv/risk#Fee", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -11665,13 +11350,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" + "@value": "2024-04-14" } ], "http://purl.org/dc/terms/modified": [ @@ -11680,6 +11365,12 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "DGA 2.10" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -11688,18 +11379,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Detriment" + "@value": "Something that acts as or provides fees e.g. for using a service" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11710,12 +11401,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Detriment" + "@value": "Fee" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L4", + "@id": "https://w3id.org/dpv/risk#RM5x5S3L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -11734,7 +11425,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.24,xsd:decimal" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11750,13 +11441,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11767,26 +11458,29 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:3 L:4)" + "@value": "Very Low Risk (RM5x5 S:3 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseReputation", + "@id": "https://w3id.org/dpv/risk#Incident", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-02-14" + }, + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], "http://purl.org/dc/terms/modified": [ @@ -11795,9 +11489,12 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples#E0069" + }, { - "@id": "_:N0282f3114f5b4278b632620b9b954c7d" + "@id": "https://w3id.org/dpv/examples#E0070" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11805,6 +11502,14 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#RiskConcept" + }, + { + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -11813,49 +11518,42 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Reputation" + "@value": "An actual or occured event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" + }, + { + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Reputation" - } - ] - }, - { - "@id": "_:N0282f3114f5b4278b632620b9b954c7d", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Incident" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "Incident is realised or materialised risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingCodeOfConduct", + "@id": "https://w3id.org/dpv/risk#RM3x3S3L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -11868,15 +11566,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N3d2e8d97024142dca7a47b73cbb8097c" + "@value": "0.33,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11887,56 +11579,34 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Code of Conduct" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Code of Conduct" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N3d2e8d97024142dca7a47b73cbb8097c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Moderate Risk (RM3x3 S:3 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#FinancialLoss", + "@id": "https://w3id.org/dpv/risk#SecurityBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -11961,7 +11631,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0296c48d481641d492572a05652b6bf5" + "@id": "_:Nb3034bc7cf1e485b85582c21529ebaa4" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11977,13 +11647,22 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity" + "@value": "Something that acts as or causes Security Breach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11994,12 +11673,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Loss" + "@value": "Security Breach" } ] }, { - "@id": "_:N0296c48d481641d492572a05652b6bf5", + "@id": "_:Nb3034bc7cf1e485b85582c21529ebaa4", "@type": [ "https://schema.org/WebPage" ], @@ -12015,11 +11694,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#HaltSource", + "@id": "https://w3id.org/dpv/risk#ModerateLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -12029,7 +11708,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.5,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12045,33 +11729,45 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SourceControl" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that halts the risk source or prevents it from materialising" + "@value": "Level where Likelihood is Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Halt Source" + "@value": "Moderate Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#HighRisk", + "@id": "https://w3id.org/dpv/risk#RiskMatrix", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv/risk#RiskAssessment" ], "http://purl.org/dc/terms/contributor": [ { @@ -12081,12 +11777,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-02-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.75,xsd:decimal" + "@id": "_:N99d1d0a8b80740559dacd97d8fb47665" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12102,45 +11798,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3RiskLevels" + "@id": "https://w3id.org/dpv/risk#RiskAssessment" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is High" + "@value": "Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other." } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk" + "@value": "Risk Matrix" + } + ] + }, + { + "@id": "_:N99d1d0a8b80740559dacd97d8fb47665", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "IEC 31010:2019" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" + "@value": "https://www.iso.org/standard/72140.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExtremelyLowLikelihood", + "@id": "https://w3id.org/dpv/risk#IncidentSuspected", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv/risk#IncidentStatus" ], "http://purl.org/dc/terms/contributor": [ { @@ -12150,12 +11850,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.01,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12171,35 +11866,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk#IncidentStatus" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Extremely Low" + "@value": "The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" + "@value": "Incident Suspected" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnwantedDisclosureData", + "@id": "https://w3id.org/dpv/risk#LoseGoodwill", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -12224,7 +11913,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N12b2c9394da44250a5ab771adc23fab8" + "@id": "_:N194bc10f01ef4bdb99f12487816e6826" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12240,13 +11929,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Disclosure of Data" + "@value": "Something that acts as or causes Loss of Goodwill" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -12257,12 +11946,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Disclosure of Data" + "@value": "Lose of Goodwill" } ] }, { - "@id": "_:N12b2c9394da44250a5ab771adc23fab8", + "@id": "_:N194bc10f01ef4bdb99f12487816e6826", "@type": [ "https://schema.org/WebPage" ], @@ -12278,11 +11967,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#LoseTrust", + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -12295,17 +11984,6 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nbb93cef662444084828d04948d35895d" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -12319,48 +11997,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Trust" + "@value": "A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Trust" - } - ] - }, - { - "@id": "_:Nbb93cef662444084828d04948d35895d", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Risk Matrix 3x3" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskAnalysis", + "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemModification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -12370,22 +12033,23 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:N837e146fba804365b9e619c05849f3d1" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "_:N029a97b214024c18a899586cb3864d2a" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#RiskAssessment" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12396,76 +12060,67 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskAssessment" + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures" + "@value": "Something that acts as or causes Unauthorised System Modification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Analysis" + "@value": "Unauthorised System Modification" } ] }, { - "@id": "_:N837e146fba804365b9e619c05849f3d1", + "@id": "_:N029a97b214024c18a899586cb3864d2a", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "IEC 31010:2019" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/72140.html" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#Incident", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - }, - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-17" } ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples#E0069" - }, + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/examples#E0070" + "@value": "0.29,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12473,14 +12128,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv#RiskConcept" - }, - { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -12489,38 +12136,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "An actual or occured event" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" - }, - { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Incident is realised or materialised risk" + "@value": "Moderate Risk (RM7x7 S:2 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L2", + "@id": "https://w3id.org/dpv/risk#RM7x7S6L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -12539,7 +12177,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.24,xsd:decimal" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12561,7 +12199,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -12572,17 +12210,39 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:6 L:2)" + "@value": "Very Low Risk (RM7x7 S:6 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#SocietalRisk", + "@id": "https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N89971235b5e34930a94f46c696e0ac94" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -12596,13 +12256,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that affect or have the potential to affect society at large or specific groups in society" + "@value": "Something that acts as or causes Unauthorised Information Disclosure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -12613,68 +12276,54 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Societal Risk" + "@value": "Unauthorised Information Disclosure" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentNearMiss", + "@id": "_:N89971235b5e34930a94f46c696e0ac94", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "accepted" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#SexualViolence", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "The state where an incident was almost successful in taking place i.e. \"it came very close\"" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "Incident Near Miss" + "@id": "_:Ncb4b4f28b9894b79bfd2a5d2dd41f88f" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IntentionalMisuse", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -12689,13 +12338,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UserRisks" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Intentional Misuse" + "@value": "Something that acts as or causes Sexual Violence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -12706,32 +12355,47 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Intentional Misuse" + "@value": "Sexual Violence" } ] }, { - "@id": "https://w3id.org/dpv/risk#Benefit", + "@id": "_:Ncb4b4f28b9894b79bfd2a5d2dd41f88f", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM3x3S2L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.22,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12747,33 +12411,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes benefits" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Benefit" + "@value": "Low Risk (RM3x3 S:2 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.86,xsd:decimal" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -12788,33 +12468,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that arise during operational processes" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Operational Security Risk" + "@value": "Extremely High Risk (RM7x7 S:7 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentHalted", + "@id": "https://w3id.org/dpv/risk#MonitorRiskControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -12824,7 +12504,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12840,37 +12520,75 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" + "@id": "https://w3id.org/dpv/risk#MonitorControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident has halted or paused with a high likelihood of resuming or recurring" + "@value": "Control that monitors another Control" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Halted" + "@value": "Monitor Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#Vulnerability", + "@id": "https://w3id.org/dpv/risk#core-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-jsonld", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/json-ld11/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/application/ld+json" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - JSON-LD serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.jsonld" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IdentificationControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12878,45 +12596,50 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskControl" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk" + "@value": "Control to identify characteristics of event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Vulnerability" + "@value": "Identification Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentPreliminaryReport", + "@id": "https://w3id.org/dpv/risk#isVulnerabilityOf", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" + ], + "http://purl.org/dc/dcam/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Vulnerability" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12924,46 +12647,41 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk#IncidentReport" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#IncidentReport" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known" + "@value": "Indicates the vulnerability (subject) is associated with indicated context (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Preliminary Report" + "@value": "is vulnerability of" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L4", + "@id": "https://w3id.org/dpv/risk#ChangeConsequence", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -12973,12 +12691,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.08,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12994,29 +12707,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#ConsequenceControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low" + "@value": "Control that changes Consequence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:1 L:4)" + "@value": "Change Consequence" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L1", + "@id": "https://w3id.org/dpv/risk#RM5x5S5L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -13035,7 +12748,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.08,xsd:decimal" + "@value": "0.40,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13051,13 +12764,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -13068,32 +12781,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:4 L:1)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RM3x3S3L3", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.99,xsd:decimal" + "@value": "High Risk (RM5x5 S:5 L:2)" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -13108,33 +12805,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High" + "@value": "Concepts associated with security threats that are likely to originate externally" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM3x3 S:3 L:3)" + "@value": "External Security Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk#VeryLowRisk", + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -13144,12 +12841,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.1,xsd:decimal" + "@value": "2022-08-17" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13165,42 +12857,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5RiskLevels" + "@id": "https://w3id.org/dpv/risk#RiskMatrix" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Very Low" + "@value": "A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" + "@value": "Risk Matrix 7x7" } ] }, { - "@id": "https://w3id.org/dpv/risk#ErroneousSystemUse", + "@id": "https://w3id.org/dpv/risk#IncidentOngoing", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#IncidentStatus" ], "http://purl.org/dc/terms/contributor": [ { @@ -13210,18 +12893,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Ne874eff2b0f74da79392c36cf77d71f1" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13237,49 +12909,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UserRisks" + "@id": "https://w3id.org/dpv/risk#IncidentStatus" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Erroneous System Use" + "@value": "The incident is ongoing i.e. still active" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Erroneous System Use" - } - ] - }, - { - "@id": "_:Ne874eff2b0f74da79392c36cf77d71f1", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Incident Ongoing" } ] }, { - "@id": "https://w3id.org/dpv/risk#IdentityFraud", + "@id": "https://w3id.org/dpv/risk#RM5x5S5L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -13292,15 +12948,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nbc1a7f7ae94c4fde84913e9622b759f6" + "@value": "0.60,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13316,49 +12966,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Identity Fraud" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identity Fraud" - } - ] - }, - { - "@id": "_:Nbc1a7f7ae94c4fde84913e9622b759f6", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "High Risk (RM5x5 S:5 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L2", + "@id": "https://w3id.org/dpv/risk#AvoidSource", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -13368,12 +13002,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.16,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13389,47 +13018,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#SourceControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low" + "@value": "Control that avoids the risk source" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:4 L:2)" + "@value": "Avoid Source" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentAssessmentReport", + "@id": "https://w3id.org/dpv/risk#VeryLowRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskLevel" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "0.1,xsd:decimal" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13440,33 +13075,58 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#7RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5RiskLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the assessment of an incident in terms of its effects or impacts" + "@value": "Level where Risk is Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Assessment Report" + "@value": "Very Low Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#InternalSecurityThreat", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.29,xsd:decimal" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -13481,29 +13141,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Concepts associated with security threats and issues that originate within the organisation" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Internal Security Threat" + "@value": "Moderate Risk (RM7x7 S:7 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Cryptojacking", + "@id": "https://w3id.org/dpv/risk#LoseOpportunity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -13528,7 +13188,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Neb960f38438d48258bee0ebae96be48e" + "@id": "_:N2ea871931e3746e4aff469f67008e44f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13544,13 +13204,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Cryptojacking" + "@value": "Something that acts as or causes Loss of Opportunity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -13561,32 +13221,48 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cryptojacking" + "@value": "Lose of Opportunity" } ] }, { - "@id": "_:Neb960f38438d48258bee0ebae96be48e", + "@id": "_:N2ea871931e3746e4aff469f67008e44f", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Landscape 2021" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#IntegrityBreach", + "@id": "https://w3id.org/dpv/risk#HighSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#Severity" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.75,xsd:decimal" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -13595,47 +13271,65 @@ ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@language": "en", - "@value": "accepted" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3SeverityLevels" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Level where Severity is High" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "https://w3id.org/dpv/risk#DataBreach" + "@language": "en", + "@value": "High Severity" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L6", + "@id": "https://w3id.org/dpv/risk#IncidentOngoingReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.49,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13646,33 +13340,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" + "@value": "A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:4 L:6)" + "@value": "Incident Ongoing Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L6", + "@id": "https://w3id.org/dpv/risk#IncidentNearMiss", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#IncidentStatus" ], "http://purl.org/dc/terms/contributor": [ { @@ -13682,12 +13376,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.24,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13703,33 +13392,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#IncidentStatus" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate" + "@value": "The state where an incident was almost successful in taking place i.e. \"it came very close\"" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:2 L:6)" + "@value": "Incident Near Miss" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S1L1", + "@id": "https://w3id.org/dpv/risk#UnwantedDisclosureData", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -13742,9 +13431,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.11,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nf14815c8a8694940bcdb35d12bf37b11" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13760,74 +13455,68 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + "@value": "Something that acts as or causes Unwanted Disclosure of Data" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM3x3 S:1 L:1)" + "@value": "Unwanted Disclosure of Data" } ] }, { - "@id": "https://w3id.org/dpv/risk#UserRisks", + "@id": "_:Nf14815c8a8694940bcdb35d12bf37b11", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "accepted" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "https://schema.org/url": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#LowSeverity", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#Severity" ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/contributor": [ { - "@language": "en", - "@value": "Concepts associated with risks that arise due to User or Human use" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@language": "en", - "@value": "User Risks" + "@value": "0.25,xsd:decimal" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#Privacy", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -13842,27 +13531,45 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3SeverityLevels" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Level where Severity is Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Privacy" + "@value": "Low Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseGoodwill", + "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -13872,18 +13579,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N4f8237833a8141b2bb3c31cf5176bf42" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13899,49 +13595,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv#Likelihood" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Goodwill" + "@value": "Scale with 3 Likelihood Levels from High to Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Goodwill" - } - ] - }, - { - "@id": "_:N4f8237833a8141b2bb3c31cf5176bf42", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "3 Likelihood Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L5", + "@id": "https://w3id.org/dpv/risk#VeryLowSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -13951,12 +13631,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.51,xsd:decimal" + "@value": "0.1,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13972,33 +13652,42 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5SeverityLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" + "@value": "Level where Severity is Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:5 L:5)" + "@value": "Very Low Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#RemoveImpact", + "@id": "https://w3id.org/dpv/risk#MaliciousCodeAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -14008,7 +13697,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N625dc3c061c74eec9f96d171c60fd3c0" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14024,33 +13724,58 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ImpactControl" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that removes Impact i.e. prevents it from materialising" + "@value": "Something that acts as or causes Malicious Code Attack" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Malicious Code Attack" } + ] + }, + { + "@id": "_:N625dc3c061c74eec9f96d171c60fd3c0", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Remove Impact" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L2", + "@id": "https://w3id.org/dpv/risk#IdentityTheft", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -14063,9 +13788,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.20,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N33b7660d50a4461e927089957dfd848b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14081,64 +13812,52 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" + "@value": "Something that acts as or causes Identity Theft" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:5 L:2)" + "@value": "Identity Theft" } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-n3", + "@id": "_:N33b7660d50a4461e927089957dfd848b", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TeamSubmission/n3/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/n3" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - N3 serialiation" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk/risk.n3" + "@value": "ENISA Threat Taxonomy 2016" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "https://schema.org/url": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L3", + "@id": "https://w3id.org/dpv/risk#PsychologicalHarm", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -14151,9 +13870,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.31,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N0ddf524630684b719d7f03f907c20cff" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14169,49 +13894,64 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + "@value": "Something that acts as or causes Psychological Harm" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:5 L:3)" + "@value": "Psychological Harm" } ] }, { - "@id": "https://w3id.org/dpv/risk#Reward", + "@id": "_:N0ddf524630684b719d7f03f907c20cff", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S3L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.37,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14227,33 +13967,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reward" + "@value": "High Risk (RM7x7 S:3 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#SourceControl", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -14263,7 +14003,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14279,33 +14024,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that controls the Source" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Source Control" + "@value": "Extremely High Risk (RM7x7 S:7 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises", + "@id": "https://w3id.org/dpv/risk#ModerateRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -14315,18 +14060,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N2b8ae4e96b21406bb91bfdec8f460776" + "@value": "0.5,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14342,49 +14081,76 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#7RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3RiskLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Access to Premises" + "@value": "Level where Risk is Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Access to Premises" + "@value": "Moderate Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" } ] }, { - "@id": "_:N2b8ae4e96b21406bb91bfdec8f460776", + "@id": "https://w3id.org/dpv/risk#serialisation-ttl", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://www.w3.org/TR/turtle/" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/format": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://www.iana.org/assignments/media-types/text/turtle" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - Turtle serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.ttl" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseCustomerConfidence", + "@id": "https://w3id.org/dpv/risk#RM7x7S4L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -14397,15 +14163,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N0d138f94265e46f293490fbe0fc8074c" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14421,53 +14181,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Customer Confidence" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Customer Confidence" + "@value": "Moderate Risk (RM7x7 S:4 L:3)" } ] }, { - "@id": "_:N0d138f94265e46f293490fbe0fc8074c", + "@id": "https://w3id.org/dpv/risk#RightsViolation", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityIncident", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/modified": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14475,11 +14231,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk#Incident" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -14488,29 +14239,35 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident where the integrity of information or system has been affected" + "@value": "Something that acts as or causes Violation of Rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Integrity Incident" + "@value": "Violation of Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S1L2", + "@id": "https://w3id.org/dpv/risk#RM7x7S4L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -14529,7 +14286,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.08,xsd:decimal" + "@value": "0.57,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14545,13 +14302,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -14562,21 +14319,31 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:1 L:2)" + "@value": "Very High Risk (RM7x7 S:4 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#ReductionControl", + "@id": "https://w3id.org/dpv/risk#RM7x7S3L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14592,29 +14359,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that reduces the likelihood or severity of an event" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reduction Control" + "@value": "Moderate Risk (RM7x7 S:3 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#EquipmentMalfunction", + "@id": "https://w3id.org/dpv/risk#IllegalDataProcessing", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -14639,7 +14406,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N7f1dc230141c4448a99f28f362191020" + "@id": "_:Nfbea264abf694083a7d1db8b2101092b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14655,13 +14422,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Equipment Malfunction" + "@value": "Something that acts as or causes Illegal Processing of Data" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -14672,18 +14439,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Equipment Malfunction" + "@value": "Illegal Data Processing" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Here equipment refers to physical equipment" + "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0" } ] }, { - "@id": "_:N7f1dc230141c4448a99f28f362191020", + "@id": "_:Nfbea264abf694083a7d1db8b2101092b", "@type": [ "https://schema.org/WebPage" ], @@ -14699,11 +14466,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels", + "@id": "https://w3id.org/dpv/risk#DenialServiceAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -14713,7 +14480,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N8705162a41ca472c9e3867ec5902de25" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14729,33 +14507,52 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Likelihood" + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 7 Likelihood Levels from Extremely High to Extremely Low" + "@value": "Something that acts as or causes Denial of Service Attack (DoS)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "7 Likelihood Levels" + "@value": "Denial of Service Attack (DoS)" } ] }, { - "@id": "https://w3id.org/dpv/risk#3RiskLevels", + "@id": "_:N8705162a41ca472c9e3867ec5902de25", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#NonMaterialDamage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -14765,7 +14562,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-03-30" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14781,53 +14584,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskLevel" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 3 Risk Levels from High to Low" + "@value": "Something that acts as or causes Non-Material Damage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "3 Risk Levels" + "@value": "Non-Material Damage" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L6", + "@id": "https://w3id.org/dpv/risk#AccidentalIncident", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.61,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14838,29 +14641,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High" + "@value": "Incident caused due to accidental actions arising from human or human-controlled situations" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:5 L:6)" + "@value": "Accidental Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExtremelyHighSeverity", + "@id": "https://w3id.org/dpv/risk#5SeverityLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -14877,11 +14680,6 @@ "@value": "2022-08-18" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.99,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -14895,13 +14693,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" + "@id": "https://w3id.org/dpv#Severity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Extremely High" + "@value": "Scale with 5 Severity Levels from Very High to Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -14912,37 +14710,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" + "@value": "5 Severity Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S4L3", + "@id": "https://w3id.org/dpv/risk#Reward", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.48,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14958,36 +14751,36 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + "@value": "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:4 L:3)" + "@value": "Reward" } ] }, { - "@id": "https://w3id.org/dpv/risk#causedByThreat", + "@id": "https://w3id.org/dpv/risk#hasVulnerability", "@type": [ "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", "http://www.w3.org/2004/02/skos/core#Concept" ], "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk#Threat" + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ], "http://purl.org/dc/terms/created": [ @@ -15010,7 +14803,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the cause of associated context (subject) was the indicated threat (object)" + "@value": "Indicates the associated context (subject) has indicated vulnerability (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -15021,21 +14814,21 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "caused by threat" + "@value": "has vulnerability" } ], "https://schema.org/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk#Threat" + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L7", + "@id": "https://w3id.org/dpv/risk#ChangeImpact", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -15045,12 +14838,53 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.57,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ImpactControl" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Control that changes Impact" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Change Impact" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IncidentMitigationMeasure", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15058,6 +14892,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#RiskMitigationMeasure" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -15066,49 +14905,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv#RiskMitigationMeasure" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High" + "@value": "A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:4 L:7)" + "@value": "Incident Mitigation Measure" } ] }, { - "@id": "https://w3id.org/dpv/risk#RightsLimitation", + "@id": "https://w3id.org/dpv/risk#RM7x7S6L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.86,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15124,35 +14962,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Limitation of Rights" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Limitation of Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0" + "@value": "Extremely High Risk (RM7x7 S:6 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#DistributedDenialServiceAttack", + "@id": "https://w3id.org/dpv/risk#SystemIntrusion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -15177,7 +15009,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N842f6dd3b92c482180f56ce6a495c382" + "@id": "_:Ne8bd9725515e46d0a941f4a4665a7868" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15192,6 +15024,15 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -15199,7 +15040,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Distributed Denial of Service Attack (DDoS)" + "@value": "Something that acts as or causes System Intrusion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -15210,28 +15051,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Distributed Denial of Service Attack (DDoS)" + "@value": "System Intrusion" } ] }, { - "@id": "_:N842f6dd3b92c482180f56ce6a495c382", + "@id": "_:Ne8bd9725515e46d0a941f4a4665a7868", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L2", + "@id": "https://w3id.org/dpv/risk#RM5x5S2L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -15250,7 +15091,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.12,xsd:decimal" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15266,13 +15107,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -15283,16 +15124,15 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:3 L:2)" + "@value": "Low Risk (RM5x5 S:2 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S5L5", + "@id": "https://w3id.org/dpv/risk#RiskAnalysis", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/contributor": [ { @@ -15302,12 +15142,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.99,xsd:decimal" + "@id": "_:N943b082c5ba64ab4896c25d1bccf20cd" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15315,6 +15155,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#RiskAssessment" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -15323,33 +15168,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskAssessment" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High" + "@value": "A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:5 L:5)" + "@value": "Risk Analysis" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L7", + "@id": "_:N943b082c5ba64ab4896c25d1bccf20cd", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "IEC 31010:2019" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/72140.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#LoseCustomerConfidence", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -15362,9 +15223,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.86,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N669b51dd9b0f4a71983f16dfc274956a" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15380,29 +15247,45 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High" + "@value": "Something that acts as or causes Loss of Customer Confidence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:6 L:7)" + "@value": "Lose of Customer Confidence" } ] }, { - "@id": "https://w3id.org/dpv/risk#SexualViolence", + "@id": "_:N669b51dd9b0f4a71983f16dfc274956a", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#HumanErrors", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -15427,7 +15310,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nbeddee22b7a841e39879764ab63949f8" + "@id": "_:Na882c52257364f5896e5b38b50bb08fe" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15443,13 +15326,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Sexual Violence" + "@value": "Something that acts as or causes Human Errors" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -15460,12 +15343,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sexual Violence" + "@value": "Human Errors" } ] }, { - "@id": "_:Nbeddee22b7a841e39879764ab63949f8", + "@id": "_:Na882c52257364f5896e5b38b50bb08fe", "@type": [ "https://schema.org/WebPage" ], @@ -15481,11 +15364,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#UnwantedDataDeletion", + "@id": "https://w3id.org/dpv/risk#IncidentRegister", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/contributor": [ { @@ -15495,23 +15377,17 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-05-19" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "_:N7ff2bed0d152400e90aff3c52f1320b0" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv#RecordsOfActivities" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15522,58 +15398,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv#RecordsOfActivities" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Data Deletion" + "@value": "A register recording incidentes, their reports, notifications, and other related activities" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Data Deletion" + "@value": "Incident Register" } ] }, { - "@id": "_:N7ff2bed0d152400e90aff3c52f1320b0", + "@id": "https://w3id.org/dpv/risk#RM5x5S3L4", "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Harshvardhan J. Pandit" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#hasIncident", - "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "0.48,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15587,31 +15453,31 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates an incident is associated with the specified context" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has incident" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Incident" + "@value": "High Risk (RM5x5 S:3 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L7", + "@id": "https://w3id.org/dpv/risk#RM5x5S4L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -15630,7 +15496,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.99,xsd:decimal" + "@value": "0.48,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15646,13 +15512,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -15663,16 +15529,22 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:7 L:7)" + "@value": "High Risk (RM5x5 S:4 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#JudicialCosts", + "@id": "https://w3id.org/dpv/risk#DetectionControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskControl" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -15687,54 +15559,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that involves or causes judicial costs to be paid" + "@value": "Control to detect event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Judicial Costs" + "@value": "Detection Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#PublicOrderBreach", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N2bd2812bbacb46319d2bdb0e95e02f65" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15750,49 +15616,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Public Order Breach" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Public Order Breach" - } - ] - }, - { - "@id": "_:N2bd2812bbacb46319d2bdb0e95e02f65", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Extremely Low Risk (RM7x7 S:2 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#MaterialDamage", + "@id": "https://w3id.org/dpv/risk#VeryLowLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -15802,13 +15652,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.1,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15824,86 +15673,103 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Material Damage" + "@value": "Level where Likelihood is Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Material Damage" + "@value": "Very Low Likelihood" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" + "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-rdf", + "@id": "https://w3id.org/dpv/risk#isExploitedBy", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + "@id": "https://w3id.org/dpv/risk#Threat" } ], - "http://purl.org/dc/terms/title": [ + "http://purl.org/dc/terms/created": [ { - "@value": "Risk Concepts - RDF/XML serialiation" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk/risk.rdf" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@language": "en", + "@value": "accepted" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RM5x5S3L1", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@value": "Harshvardhan J. Pandit" + "@language": "en", + "@value": "Indicates the vulnerability (subject) is exploited by the indicated threat (object)" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "0.12,xsd:decimal" + "@language": "en", + "@value": "is exploited by" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Vulnerability" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Threat" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#FinancialImpact", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -15918,33 +15784,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Things that cause or have the potential to impact financial resources" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:3 L:1)" + "@value": "Financial Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S5L3", + "@id": "https://w3id.org/dpv/risk#Terrorism", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -15957,9 +15823,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.60,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N84e706a33b7c462194d2c8fb5c04326c" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15975,43 +15847,58 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High" + "@value": "Something that acts as or causes Terrorism" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:5 L:3)" + "@value": "Terrorism" } ] }, { - "@id": "https://w3id.org/dpv/risk#MonitorImpact", + "@id": "_:N84e706a33b7c462194d2c8fb5c04326c", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#causedByThreat", + "@type": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" + ], + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Threat" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16025,31 +15912,31 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#MonitorControl" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Impact" + "@value": "Indicates the cause of associated context (subject) was the indicated threat (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Impact" + "@value": "caused by threat" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S2L2", + "@id": "https://w3id.org/dpv/risk#RM5x5S5L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -16068,7 +15955,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.16,xsd:decimal" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16090,7 +15977,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -16101,17 +15988,39 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:2 L:2)" + "@value": "Very High Risk (RM5x5 S:5 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk", + "@id": "https://w3id.org/dpv/risk#ViolatingLegalObligation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N0b5dd4cc254540f49140434e86708abb" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -16120,18 +16029,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that affect the reputation of the organisation" + "@value": "Something that acts as or causes Violation of Legal Obligations" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -16142,16 +16051,38 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reputational Risk" + "@value": "Violation of Legal Obligations" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentSuspected", + "@id": "_:N0b5dd4cc254540f49140434e86708abb", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#FinancialLoss", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -16161,7 +16092,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N698d6b9272804e2dba685b14f6e69152" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16177,33 +16119,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing" + "@value": "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Suspected" + "@value": "Financial Loss" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S1L3", + "@id": "_:N698d6b9272804e2dba685b14f6e69152", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#SystemMalfunction", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -16216,9 +16174,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.12,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N18aeaa08367a4c56822793249e34feae" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16234,39 +16198,58 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low" + "@value": "Something that acts as or causes System Malfunction" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:1 L:3)" + "@value": "System Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here system refers to both hardware and software systems" } ] }, { - "@id": "https://w3id.org/dpv/risk#core-classes", + "@id": "_:N18aeaa08367a4c56822793249e34feae", "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } ] }, { - "@id": "https://w3id.org/dpv/risk#ExtremelyHighLikelihood", + "@id": "https://w3id.org/dpv/risk#RM5x5S4L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -16276,12 +16259,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.99,xsd:decimal" + "@value": "0.32,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16297,58 +16280,54 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Extremely High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" + "@value": "Moderate Risk (RM5x5 S:4 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#refersToRisk", + "@id": "https://w3id.org/dpv/risk#ViolenceAgainstChildren", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv#Incident" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv#Risk" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/modified": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-08-16" } ], - "http://purl.org/vocab/vann/example": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/examples#E0069" + "@id": "_:N50def33314ee4442bf7e77161e51165b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16362,54 +16341,77 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#IndividualRisk" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the incident (subject) is a materialisation of the indicated risk (object)" + "@value": "Something that acts as or causes Child Violence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "refers to risk" + "@value": "Violence against children" } ], - "https://schema.org/domainIncludes": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "https://w3id.org/dpv#Incident" + "@language": "en", + "@value": "This concept was called \"ChildViolence\" in DPV 2.0" + } + ] + }, + { + "@id": "_:N50def33314ee4442bf7e77161e51165b", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "https://schema.org/rangeIncludes": [ + "https://schema.org/url": [ { - "@id": "https://w3id.org/dpv#Risk" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentOngoingReport", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "0.08,xsd:decimal" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16420,29 +16422,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Ongoing Report" + "@value": "Very Low Risk (RM7x7 S:1 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeAccess", + "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeModification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -16467,7 +16469,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N8193907d23bd43dc8b146573989b8a0d" + "@id": "_:Ncecbd81981b3460f9cede6031d4ab8b1" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16482,6 +16484,9 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -16489,7 +16494,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Access" + "@value": "Something that acts as or causes Unauthorised Code Modification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -16500,12 +16505,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Access" + "@value": "Unauthorised Code Modification" } ] }, { - "@id": "_:N8193907d23bd43dc8b146573989b8a0d", + "@id": "_:Ncecbd81981b3460f9cede6031d4ab8b1", "@type": [ "https://schema.org/WebPage" ], @@ -16521,58 +16526,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentNotice", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv#Notice" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv#Notice" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Notice associated with an Incident" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#incident-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Incident Notice" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#AuthorisationFailure", + "@id": "https://w3id.org/dpv/risk#UnauthorisedResourceUse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -16597,7 +16551,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N8906a1d2a7bd4484854e88a2dc1b93a5" + "@id": "_:N605e2cac18a74200ab14cc33e319b6cb" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16613,13 +16567,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Authorisation Failure" + "@value": "Something that acts as or causes Unauthorised Resource Use" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -16630,28 +16587,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Authorisation Failure" + "@value": "Unauthorised Resource Use" } ] }, { - "@id": "_:N8906a1d2a7bd4484854e88a2dc1b93a5", + "@id": "_:N605e2cac18a74200ab14cc33e319b6cb", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISa Trust Services Security Incidents 2021" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S4L1", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -16670,7 +16627,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.16,xsd:decimal" + "@value": "0.10,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16686,13 +16643,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -16703,32 +16660,31 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:4 L:1)" + "@value": "Very Low Risk (RM7x7 S:1 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#SocialDisadvantage", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16744,33 +16700,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Social Disadvantage" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Social Disadvantage" + "@value": "Very Low Risk (RM7x7 S:1 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Damage", + "@id": "https://w3id.org/dpv/risk#RM7x7S5L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -16780,13 +16736,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16802,29 +16757,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Damage" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Damage" + "@value": "Low Risk (RM7x7 S:5 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S1L2", + "@id": "https://w3id.org/dpv/risk#RM5x5S1L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -16843,7 +16798,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.22,xsd:decimal" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16859,13 +16814,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -16876,16 +16831,78 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM3x3 S:1 L:2)" + "@value": "Low Risk (RM5x5 S:1 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S1L5", + "@id": "https://w3id.org/dpv/guides", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Guides for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/guides" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/primer", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Primer for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/primer" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#3RiskLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -16895,12 +16912,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.20,xsd:decimal" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16916,47 +16928,91 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv#RiskLevel" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low" + "@value": "Scale with 3 Risk Levels from High to Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:1 L:5)" + "@value": "3 Risk Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentIdentifier", + "@id": "https://w3id.org/dpv/risk#AvailabilityBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#DataBreach" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedDataModification", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk#" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/source": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "_:Nb76ee4ad00614561b02ea8b1fd3da77c" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16965,26 +17021,56 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Identifier associated with an incident" + "@value": "Something that acts as or causes Unauthorised Data Modification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Identifier" + "@value": "Unauthorised Data Modification" } ] }, { - "@id": "https://w3id.org/dpv/risk#Fraud", + "@id": "_:Nb76ee4ad00614561b02ea8b1fd3da77c", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeAccess", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -17009,7 +17095,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd4dde0f0f01e4d739b22630aa8ad7d7a" + "@id": "_:N99568e0cd3774d348d85262f04bc3a0b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17024,6 +17110,12 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -17031,7 +17123,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Fraud" + "@value": "Something that acts as or causes Unauthorised Code Access" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -17042,32 +17134,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Fraud" + "@value": "Unauthorised Code Access" } ] }, { - "@id": "_:Nd4dde0f0f01e4d739b22630aa8ad7d7a", + "@id": "_:N99568e0cd3774d348d85262f04bc3a0b", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#ChangeImpact", + "@id": "https://w3id.org/dpv/risk#IncidentConcluded", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#IncidentStatus" ], "http://purl.org/dc/terms/contributor": [ { @@ -17077,7 +17169,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17093,29 +17185,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ImpactControl" + "@id": "https://w3id.org/dpv/risk#IncidentStatus" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that changes Impact" + "@value": "The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Change Impact" + "@value": "Incident Concluded" } ] }, { - "@id": "https://w3id.org/dpv/risk#DenialServiceAttack", + "@id": "https://w3id.org/dpv/risk#DistributedDenialServiceAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -17140,10 +17232,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N51a29309d655420e8611a50e7d2baa7c" - }, - { - "@id": "_:Nf82ac345e0fe44a394f7da0ec78ef801" + "@id": "_:N64ebcf10636d495599fc0fd262e44103" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17158,6 +17247,9 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -17165,7 +17257,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Denial of Service Attack (DoS)" + "@value": "Something that acts as or causes Distributed Denial of Service Attack (DDoS)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -17176,12 +17268,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Denial of Service Attack (DoS)" + "@value": "Distributed Denial of Service Attack (DDoS)" } ] }, { - "@id": "_:N51a29309d655420e8611a50e7d2baa7c", + "@id": "_:N64ebcf10636d495599fc0fd262e44103", "@type": [ "https://schema.org/WebPage" ], @@ -17197,31 +17289,27 @@ ] }, { - "@id": "_:Nf82ac345e0fe44a394f7da0ec78ef801", + "@id": "https://w3id.org/dpv/risk#Damage", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-03-30" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ThreatSource", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/modified": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17229,37 +17317,37 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#LegalRisk" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Source of threat event, including both agent and non-agent sources" + "@value": "Something that acts as or causes Damage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Threat Source" + "@value": "Damage" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S3L1", + "@id": "https://w3id.org/dpv/risk#RM7x7S3L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -17278,7 +17366,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.33,xsd:decimal" + "@value": "0.31,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17294,13 +17382,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -17311,16 +17399,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM3x3 S:3 L:1)" + "@value": "High Risk (RM7x7 S:3 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L3", + "@id": "https://w3id.org/dpv/risk#LowLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -17330,12 +17418,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.43,xsd:decimal" + "@value": "0.25,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17351,29 +17439,41 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High" + "@value": "Level where Likelihood is Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:7 L:3)" + "@value": "Low Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingContractualObligation", + "@id": "https://w3id.org/dpv/risk#Renumeration", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -17381,13 +17481,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], "http://purl.org/dc/terms/modified": [ @@ -17396,11 +17496,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N1802c2900f5b4c578896c91c3149381d" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -17409,18 +17504,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Contractual Obligations" + "@value": "Something that acts as or provides renumeration which is in monetary or financial form" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -17431,38 +17526,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Contractual Obligation" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N1802c2900f5b4c578896c91c3149381d", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Remuneration" } ] }, { - "@id": "https://w3id.org/dpv/risk#ShareRisk", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -17472,7 +17545,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.02,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17488,29 +17566,70 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that shares Risk e.g. amongst stakeholders" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Share Risk" + "@value": "Extremely Low Risk (RM7x7 S:1 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L2", + "@id": "https://w3id.org/dpv/risk#JudicialCosts", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#FinancialImpact" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that involves or causes judicial costs to be paid" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Judicial Costs" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S3L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -17529,7 +17648,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.08,xsd:decimal" + "@value": "0.43,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17551,7 +17670,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -17562,12 +17681,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:2 L:2)" + "@value": "Very High Risk (RM7x7 S:3 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S3L5", + "@id": "https://w3id.org/dpv/risk#RM5x5S1L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -17586,7 +17705,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.60,xsd:decimal" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17608,7 +17727,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -17619,12 +17738,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:3 L:5)" + "@value": "Very Low Risk (RM5x5 S:1 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Blackmail", + "@id": "https://w3id.org/dpv/risk#ViolatingContractualObligation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -17649,7 +17768,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N3ef9f5a9eb554279905f69c263712205" + "@id": "_:N638499f1a35f4f94abab8a1e6e4bf97d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17660,55 +17779,97 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#LegalRisk" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Violation of Contractual Obligations" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Violation of Contractual Obligation" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0" + } + ] + }, + { + "@id": "_:N638499f1a35f4f94abab8a1e6e4bf97d", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-n3", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ { - "@language": "en", - "@value": "Something that acts as or causes Blackmail" + "@id": "https://www.w3.org/TeamSubmission/n3/" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://www.iana.org/assignments/media-types/text/n3" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "Blackmail" + "@value": "Risk Concepts - N3 serialiation" } - ] - }, - { - "@id": "_:N3ef9f5a9eb554279905f69c263712205", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk/risk.n3" } ], - "https://schema.org/url": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk#IdentificationControl", + "@id": "https://w3id.org/dpv/risk#MonitorRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk#RiskControl" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", @@ -17728,13 +17889,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#MonitorControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to identify characteristics of event" + "@value": "Control that monitors a Risk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -17745,42 +17906,30 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identification Control" + "@value": "Monitor Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#BruteForceAuthorisations", + "@id": "https://w3id.org/dpv/risk#AvailabilityIncident", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-05-19" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "_:Ned6a23a4f6894305bc5d07abc6872b8e" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17791,45 +17940,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques" + "@value": "Incident where the availability of information or system has been affected" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Brute Force Authorisations" - } - ] - }, - { - "@id": "_:Ned6a23a4f6894305bc5d07abc6872b8e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Availability Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#Discrimination", + "@id": "https://w3id.org/dpv/risk#Fraud", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -17837,13 +17970,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -17852,6 +17985,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N0328e4baf7504ceb93cd9bbab8b23099" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -17865,13 +18003,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Discrimination" + "@value": "Something that acts as or causes Fraud" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -17882,12 +18023,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Discrimination" + "@value": "Fraud" } ] }, { - "@id": "https://w3id.org/dpv/risk#PhishingScam", + "@id": "_:N0328e4baf7504ceb93cd9bbab8b23099", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ViolatingCodeOfConduct", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -17912,7 +18069,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N2039355de6a7474a8ab35355297e33c6" + "@id": "_:Nb240be91051241df8fe71581eedea8cc" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17923,18 +18080,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Phishing Scam" + "@value": "Something that acts as or causes Violation of Code of Conduct" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -17945,50 +18102,39 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Phishing Scam" + "@value": "Violating Code of Conduct" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0" } ] }, { - "@id": "_:N2039355de6a7474a8ab35355297e33c6", + "@id": "_:Nb240be91051241df8fe71581eedea8cc", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#Renumeration", + "@id": "https://w3id.org/dpv/risk#IntentionalMisuse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -18002,13 +18148,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides renumeration which is in monetary or financial form" + "@value": "Intentional Misuse" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -18019,206 +18165,224 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remuneration" + "@value": "Intentional Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk#IdentityTheft", + "@id": "https://w3id.org/dpv/risk", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "http://www.w3.org/2002/07/owl#Ontology", + "http://www.w3.org/ns/dx/prof/Profile" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/bibliographicCitation": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ + "@value": "http://www.w3.org/2000/01/rdf-schema" + }, { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "http://www.w3.org/2004/02/skos/core" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "_:Nad476399871e41a5bd37e1133df27770" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "@value": "Delaram Golpayegani" + }, { - "@id": "https://w3id.org/dpv/risk#" + "@value": "Fajar Ekaputra" + }, + { + "@value": "Rob Brennan" + }, + { + "@value": "Julio Fernandez" + }, + { + "@value": "Axel Polleres" + }, + { + "@value": "Beatriz Esteves" + }, + { + "@value": "Georg P. Krog" + }, + { + "@value": "Julian Flake" + }, + { + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/created": [ { "@language": "en", - "@value": "accepted" + "@value": "2022-08-14" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/dc/terms/creator": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "@language": "en", + "@value": "Harshvardhan J. Pandit" + }, { "@language": "en", - "@value": "Something that acts as or causes Identity Theft" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "@value": "Georg P. Krog" + }, { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@language": "en", + "@value": "Paul Ryan" + }, + { + "@language": "en", + "@value": "Rob Brennan" + }, + { + "@language": "en", + "@value": "Delaram Golpayegani" + }, + { + "@language": "en", + "@value": "Beatriz Esteves" + }, + { + "@language": "en", + "@value": "Julian Flake" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/description": [ { "@language": "en", - "@value": "Identity Theft" + "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" } - ] - }, - { - "@id": "_:Nad476399871e41a5bd37e1133df27770", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/identifier": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "https://w3id.org/dpv/risk" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/issued": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@language": "en", + "@value": "2022-08-14" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L6", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/license": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://www.w3.org/copyright/document-license-2023/" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/modified": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@language": "en", + "@value": "2024-07-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/publisher": [ { - "@value": "0.73,xsd:decimal" + "@id": "https://www.w3.org/" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://www.w3.org/groups/cg/dpvcg/" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/title": [ { "@language": "en", - "@value": "accepted" + "@value": "Risk Concepts" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/ontology/bibo/doi": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@value": "10.5281/zenodo.12505841" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/ontology/bibo/status": [ { - "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High" + "@value": "http://purl.org/ontology/bibo/status/published" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/vocab/vann/preferredNamespacePrefix": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@value": "risk" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/vocab/vann/preferredNamespaceUri": [ { - "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:6 L:6)" + "@value": "https://w3id.org/dpv/risk#" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#UnauthorisedReidentification", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#Label": [ { - "@value": "Georg P. Krog" + "@language": "en", + "@value": "RISK" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2002/07/owl#versionIRI": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@id": "https://w3id.org/dpv/2.1-dev/risk" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2002/07/owl#versionInfo": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2.1-dev" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/ns/dx/prof/hasResource": [ { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "@id": "https://w3id.org/dpv/primer" + }, { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "@id": "https://w3id.org/dpv/guides" + }, { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/examples" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-html" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-rdf" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-ttl" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-n3" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-jsonld" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/ns/dx/prof/isProfileOf": [ { - "@language": "en", - "@value": "Something that acts as or causes Unauthorised Re-Identification" + "@id": "http://www.w3.org/2000/01/rdf-schema#" + }, + { + "@id": "http://www.w3.org/2004/02/skos/core#" + }, + { + "@id": "https://w3id.org/dpv" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://xmlns.com/foaf/0.1/logo": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/media/logo.png" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/version": [ { - "@language": "en", - "@value": "Unauthorised Re-Identification" + "@value": "2.1-dev" } ] }, { - "@id": "https://w3id.org/dpv/risk#InterceptCommunications", + "@id": "https://w3id.org/dpv/risk#Benefit", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -18226,13 +18390,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-23" } ], "http://purl.org/dc/terms/modified": [ @@ -18241,11 +18405,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N9ba04625c759479eba79e0016163e8e6" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -18254,18 +18413,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Interception of Communications" + "@value": "Something that acts as or causes benefits" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -18276,38 +18435,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Intercept Communications" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N9ba04625c759479eba79e0016163e8e6", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Benefit" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseCredibility", + "@id": "https://w3id.org/dpv/risk#RM5x5S4L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -18320,15 +18457,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N347037135ba54cefae0a2a69a47e52d9" + "@value": "0.64,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18344,53 +18475,43 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Credibility" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Credibility" + "@value": "Very High Risk (RM5x5 S:4 L:4)" } ] }, { - "@id": "_:N347037135ba54cefae0a2a69a47e52d9", + "@id": "https://w3id.org/dpv/risk#incident-status-classes", "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } + "http://www.w3.org/2004/02/skos/core#ConceptScheme" ] }, { - "@id": "https://w3id.org/dpv/risk#VeryHighSeverity", + "@id": "https://w3id.org/dpv/risk#RightsLimitation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ @@ -18399,9 +18520,10 @@ "@value": "2022-08-18" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.9,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18417,62 +18539,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5SeverityLevels" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Very High" + "@value": "Something that acts as or causes Limitation of Rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Severity" + "@value": "Limitation of Rights" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" + "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S2L1", + "@id": "https://w3id.org/dpv/risk#IncidentSuspectedReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.08,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18483,33 +18596,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "A report describing the suspicion of an incident in the past or occuring" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:2 L:1)" + "@value": "Incident Suspected Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#VeryLowSeverity", + "@id": "https://w3id.org/dpv/risk#MonitorControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -18519,12 +18632,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.1,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18540,38 +18648,35 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5SeverityLevels" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Very Low" + "@value": "Risk Mitigation Measure that uses controls to monitor events" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Severity" + "@value": "Monitor Control" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" + "@value": "Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised." } ] }, { - "@id": "https://w3id.org/dpv/risk#Terrorism", + "@id": "https://w3id.org/dpv/risk#PhysicalAssault", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -18596,7 +18701,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nf6a25073f9274363bcb649fe8540fc70" + "@id": "_:N6b8cf1ee50ba4ea081a101b53baf3bb3" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18612,13 +18717,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Terrorism" + "@value": "Something that acts as or causes Physical Assault" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -18629,12 +18734,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Terrorism" + "@value": "Physical Assault" } ] }, { - "@id": "_:Nf6a25073f9274363bcb649fe8540fc70", + "@id": "_:N6b8cf1ee50ba4ea081a101b53baf3bb3", "@type": [ "https://schema.org/WebPage" ], @@ -18650,11 +18755,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#MonitorVulnerabilities", + "@id": "https://w3id.org/dpv/risk#7RiskLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -18664,7 +18769,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18680,33 +18785,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MonitorControl" + "@id": "https://w3id.org/dpv#RiskLevel" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Vulnerability" + "@value": "Scale with 7 Risk Levels from Extremely High to Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Vulnerabilities" + "@value": "7 Risk Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#LowLikelihood", + "@id": "https://w3id.org/dpv/risk#MaterialDamage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -18716,12 +18821,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-03-30" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.25,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18737,45 +18843,39 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Low" + "@value": "Something that acts as or causes Material Damage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Likelihood" + "@value": "Material Damage" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L4", + "@id": "https://w3id.org/dpv/risk#EquipmentFailure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -18788,9 +18888,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.33,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N8e86fbf714a04b25a51dfcacec1cb10e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18806,49 +18912,73 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High" + "@value": "Something that acts as or causes Equipment Failure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:4 L:4)" + "@value": "Equipment Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here equipment refers to physical equipment" } ] }, { - "@id": "https://w3id.org/dpv/risk#Payment", + "@id": "_:N8e86fbf714a04b25a51dfcacec1cb10e", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM5x5S2L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18864,54 +18994,39 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Payment" + "@value": "Moderate Risk (RM5x5 S:2 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentRegister", + "@id": "https://w3id.org/dpv/risk#SocietalRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv#RecordsOfActivities" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -18920,29 +19035,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RecordsOfActivities" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A register recording incidentes, their reports, notifications, and other related activities" + "@value": "Risks and issues that affect or have the potential to affect society at large or specific groups in society" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Register" + "@value": "Societal Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L3", + "@id": "https://w3id.org/dpv/risk#RM5x5S2L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -18961,7 +19076,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.18,xsd:decimal" + "@value": "0.32,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18977,13 +19092,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -18994,16 +19109,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:3 L:3)" + "@value": "Moderate Risk (RM5x5 S:2 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#VeryLowLikelihood", + "@id": "https://w3id.org/dpv/risk#ExtremelyHighSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -19018,7 +19133,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.1,xsd:decimal" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19034,16 +19149,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Very Low" + "@value": "Level where Severity is Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -19054,21 +19166,22 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Likelihood" + "@value": "Extremely High Severity" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" + "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentStatus", + "@id": "https://w3id.org/dpv/risk#MonitorVulnerabilities", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -19078,12 +19191,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples#E0069" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19091,11 +19199,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv#Status" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -19104,33 +19207,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Status" + "@id": "https://w3id.org/dpv/risk#MonitorControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Status associated with an incident" + "@value": "Control that monitors a Risk Vulnerability" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Status" + "@value": "Monitor Vulnerabilities" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExtremelyLowSeverity", + "@id": "https://w3id.org/dpv/risk#RemoveSource", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -19140,12 +19243,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.01,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19161,30 +19259,24 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" + "@id": "https://w3id.org/dpv/risk#SourceControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Extremely Low" + "@value": "Control that removes the risk source" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" + "@value": "Remove Source" } ] } diff --git a/2.1-dev/risk/risk.n3 b/2.1-dev/risk/risk.n3 index 2c375f60a..bf771fc79 100644 --- a/2.1-dev/risk/risk.n3 +++ b/2.1-dev/risk/risk.n3 @@ -156,7 +156,9 @@ risk:AuthorisationFailure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Authorisation Failure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Authorisation Failure"@en . @@ -166,7 +168,8 @@ risk:AvailabilityBreach a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:DataBreach ; + skos:broader risk:AvailabilityConcept, + risk:DataBreach ; skos:inScheme risk:risk-consequences-classes . risk:AvailabilityIncident a rdfs:Class, @@ -216,7 +219,8 @@ risk:Blackmail a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Blackmail"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Blackmail"@en . @@ -232,7 +236,9 @@ risk:BruteForceAuthorisations a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Brute Force Authorisations"@en . @@ -272,7 +278,8 @@ risk:Coercion a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Coercion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Coercion"@en . @@ -295,7 +302,8 @@ risk:ComponentFailure a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Component Failure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Component Failure"@en ; @@ -306,7 +314,8 @@ risk:ComponentMalfunction a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Component Malfunction"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Component Malfunction"@en ; @@ -323,7 +332,10 @@ risk:CompromiseAccount a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Compromise Account"@en . @@ -339,7 +351,8 @@ risk:CompromiseAccountCredentials a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:ConfidentialityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Compromise Account Credentials"@en . @@ -355,7 +368,8 @@ risk:ConfidentialityBreach a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:DataBreach ; + skos:broader risk:ConfidentialityConcept, + risk:DataBreach ; skos:definition "Something that acts as or causes Confidentiality Breach"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Confidentiality Breach"@en . @@ -432,7 +446,8 @@ risk:Cryptojacking a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Cryptojacking"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Cryptojacking"@en . @@ -463,7 +478,10 @@ risk:DataBreach a rdfs:Class, dex:E0071 ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SecurityBreach ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:SecurityBreach ; skos:definition "Something that acts as or causes Data Breach"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Data Breach"@en . @@ -479,7 +497,8 @@ risk:DataCorruption a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:IntegrityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Corruption of Data"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Data Corruption"@en ; @@ -503,14 +522,12 @@ risk:DenialServiceAttack a rdfs:Class, dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ], - [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Denial of Service Attack (DoS)"@en . @@ -563,7 +580,8 @@ risk:DistributedDenialServiceAttack a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en . @@ -600,7 +618,8 @@ risk:EquipmentFailure a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Equipment Failure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Equipment Failure"@en ; @@ -617,7 +636,8 @@ risk:EquipmentMalfunction a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Equipment Malfunction"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Equipment Malfunction"@en ; @@ -677,7 +697,8 @@ risk:Extorsion a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Extorsion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Extorsion"@en . @@ -817,7 +838,8 @@ risk:Fraud a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Fraud"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Fraud"@en . @@ -934,7 +956,8 @@ risk:IdentityFraud a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:ConfidentialityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Identity Fraud"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Identity Fraud"@en . @@ -950,7 +973,8 @@ risk:IdentityTheft a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:ConfidentialityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Identity Theft"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Identity Theft"@en . @@ -1294,7 +1318,8 @@ risk:IntegrityBreach a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:DataBreach ; + skos:broader risk:DataBreach, + risk:IntegrityConcept ; skos:inScheme risk:risk-consequences-classes . risk:IntegrityIncident a rdfs:Class, @@ -1329,22 +1354,13 @@ risk:InterceptCommunications a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Interception of Communications"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Intercept Communications"@en ; skos:scopeNote "This concept was called \"InterceptionCommunications\" in DPV 2.0"@en . -risk:InternalSecurityThreat a rdfs:Class, - skos:Concept, - dpv:RiskConcept ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader dpv:RiskConcept ; - skos:definition "Concepts associated with security threats and issues that originate within the organisation"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Internal Security Threat"@en . - risk:JudicialCosts a rdfs:Class, skos:Concept, dpv:RiskConcept ; @@ -1546,7 +1562,10 @@ risk:MaliciousCodeAttack a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Malicious Code Attack"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Malicious Code Attack"@en . @@ -1562,7 +1581,10 @@ risk:MalwareAttack a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Malware Attack"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Malware Attack"@en . @@ -1791,7 +1813,8 @@ risk:PhishingScam a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Phishing Scam"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Phishing Scam"@en . @@ -2995,7 +3018,8 @@ risk:Reidentification a rdfs:Class, dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:ConfidentialityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Re-identification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Re-identification"@en ; @@ -3268,7 +3292,9 @@ risk:Sabotage a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Sabotage"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Sabotage"@en . @@ -3284,7 +3310,8 @@ risk:Scam a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Scam"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Scam"@en . @@ -3294,7 +3321,10 @@ risk:SecurityAttack a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Security Attack"@en . @@ -3310,7 +3340,10 @@ risk:SecurityBreach a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Security Breach"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Security Breach"@en . @@ -3401,7 +3434,9 @@ risk:Spoofing a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat, + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept, risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Spoofing"@en ; skos:inScheme risk:risk-consequences-classes ; @@ -3418,7 +3453,8 @@ risk:SystemFailure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes System Failure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "System Failure"@en ; @@ -3435,7 +3471,10 @@ risk:SystemIntrusion a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes System Intrusion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "System Intrusion"@en . @@ -3451,7 +3490,8 @@ risk:SystemMalfunction a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes System Malfunction"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "System Malfunction"@en ; @@ -3505,7 +3545,10 @@ risk:UnauthorisedAccesstoPremises a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Access to Premises"@en . @@ -3515,7 +3558,10 @@ risk:UnauthorisedActivity a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised Activity"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Activity"@en . @@ -3531,7 +3577,9 @@ risk:UnauthorisedCodeAccess a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised Code Access"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Code Access"@en . @@ -3547,7 +3595,8 @@ risk:UnauthorisedCodeDisclosure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Code Disclosure"@en . @@ -3563,7 +3612,8 @@ risk:UnauthorisedCodeModification a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Code Modification"@en . @@ -3579,7 +3629,8 @@ risk:UnauthorisedDataAccess a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Data Access"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Data Access"@en . @@ -3595,7 +3646,8 @@ risk:UnauthorisedDataDisclosure a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Data Disclosure"@en . @@ -3611,7 +3663,8 @@ risk:UnauthorisedDataModification a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Data Modification"@en . @@ -3627,7 +3680,8 @@ risk:UnauthorisedInformationDisclosure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Information Disclosure"@en . @@ -3640,7 +3694,8 @@ risk:UnauthorisedReidentification a rdfs:Class, dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Re-Identification"@en . @@ -3656,7 +3711,8 @@ risk:UnauthorisedResourceUse a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Resource Use"@en . @@ -3672,7 +3728,9 @@ risk:UnauthorisedSystemAccess a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised System Access"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised System Access"@en . @@ -3688,7 +3746,8 @@ risk:UnauthorisedSystemModification a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised System Modification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised System Modification"@en . @@ -3704,7 +3763,9 @@ risk:UnwantedCodeDeletion a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unwanted Code Deletion"@en . @@ -3720,7 +3781,9 @@ risk:UnwantedDataDeletion a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unwanted Data Deletion"@en . @@ -3736,7 +3799,8 @@ risk:UnwantedDisclosureData a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unwanted Disclosure of Data"@en . @@ -3963,22 +4027,6 @@ risk:Vulnerability a rdfs:Class, skos:inScheme risk:core-classes ; skos:prefLabel "Vulnerability"@en . -risk:VulnerabilityCreated a rdfs:Class, - skos:Concept, - dpv:RiskConcept ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:modified "2024-08-16"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:InternalSecurityThreat ; - skos:definition "Something that acts as or causes Vulnerability Created"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Vulnerability Created"@en . - a owl:Ontology, profile:Profile ; dct:bibliographicCitation "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" ; diff --git a/2.1-dev/risk/risk.rdf b/2.1-dev/risk/risk.rdf index 484e39a72..a6fe7a9a7 100644 --- a/2.1-dev/risk/risk.rdf +++ b/2.1-dev/risk/risk.rdf @@ -13,158 +13,178 @@ xmlns:sw="http://www.w3.org/2003/06/sw-vocab-status/ns#" xmlns:vann="http://purl.org/vocab/vann/" > - + - - Physical Assault - Something that acts as or causes Physical Assault - - + + Extremely Low Severity + Level where Severity is Extremely Low + + 0.01,xsd:decimal + The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 + 2022-08-18 + accepted + Harshvardhan J. Pandit + + + + + + + + Very Low Risk (RM7x7 S:1 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low + + 0.10,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Environmental Incident - Incident caused due to environmental factors outside human controls - - + + Share Risk + Risk Mitigation Measure that shares Risk e.g. amongst stakeholders + 2024-05-19 accepted + Harshvardhan J. Pandit - + - + - - Risk Matrix 7x7 - A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types - + + Blackmail + Something that acts as or causes Blackmail + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - has risk source - Indicates the risk (subject) has the indicated risk source (object) - - - - + refers to risk + Indicates the incident (subject) is a materialisation of the indicated risk (object) + + + + 2024-02-14 accepted + - + - Lose of Negotiating Capacity - Something that acts as or causes Loss of Negotiating Capacity - - + Violation of Contractual Obligation + Something that acts as or causes Violation of Contractual Obligations + + This concept was called "ViolationContractualObligations" in DPV 2.0 + 2022-08-17 2024-08-16 - accepted + modified Harshvardhan J. Pandit - + - Remuneration - Something that acts as or provides renumeration which is in monetary or financial form + Fee + Something that acts as or provides fees e.g. for using a service + DGA 2.10 2024-04-14 2024-08-16 - accepted + modified Georg P. Krog, Harshvardhan J. Pandit - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - + - Moderate Risk (RM7x7 S:5 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate + Very High Risk (RM7x7 S:5 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High - 0.31,xsd:decimal + 0.51,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Social Disadvantage - Something that acts as or causes Social Disadvantage - - 2022-08-19 - 2024-08-16 + + Moderate Risk + Level where Risk is Moderate + + + + 0.5,xsd:decimal + The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 + 2022-08-18 accepted - Georg P. Krog + Harshvardhan J. Pandit - + - + - - Very High Risk (RM5x5 S:4 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High - - 0.80,xsd:decimal - 2022-08-17 + + Extremely Low Risk + Level where Risk is Extremely Low + + 0.01,xsd:decimal + The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - - Very High Risk (RM5x5 S:4 L:4) - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High - - 0.64,xsd:decimal - 2022-08-17 + + Component Malfunction + Something that acts as or causes Component Malfunction + + + Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of accepted - Harshvardhan J. Pandit - + - + - Phishing Scam - Something that acts as or causes Phishing Scam + Cryptojacking + Something that acts as or causes Cryptojacking + - + 2022-08-17 2024-08-16 accepted @@ -172,413 +192,369 @@ - + - - Extremely High Risk (RM7x7 S:7 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High - - 0.71,xsd:decimal + + Distributed Denial of Service Attack (DDoS) + Something that acts as or causes Distributed Denial of Service Attack (DDoS) + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Very Low Severity - Level where Severity is Very Low - - - 0.1,xsd:decimal - The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 - 2022-08-18 + + Unauthorised Access to Premises + Something that acts as or causes Unauthorised Access to Premises + + + + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Incident Ongoing - The incident is ongoing i.e. still active - - 2024-02-14 + + Extremely High Risk (RM7x7 S:6 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High + + 0.86,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - - - - - - Deliberate Incident - Incident caused due to deliberate actions of a human - - - 2024-05-19 - accepted - - + - + - Moderate Risk (RM3x3 S:2 L:2) - Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate - - 0.44,xsd:decimal + Very Low Risk (RM5x5 S:1 L:1) + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low + + 0.04,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Extremely Low Risk (RM7x7 S:2 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low + Very Low Risk (RM7x7 S:1 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low - 0.04,xsd:decimal + 0.08,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - - - - - Risk Concepts - HTML serialiation - - - - - has vulnerability - Indicates the associated context (subject) has indicated vulnerability (object) - - - 2024-02-14 - accepted - - - - - - - - Avoid Source - Control that avoids the risk source - - 2024-05-19 - accepted - Harshvardhan J. Pandit - - - - + - Personal Safety Endangerment - Something that acts as or causes Personal Safety Endangerment - - + Data Corruption + Something that acts as or causes Corruption of Data + + + This concept was called "Corruption Data" in DPV 2.0 + 2022-08-17 2024-08-16 - accepted + modified Harshvardhan J. Pandit - + - Fraud - Something that acts as or causes Fraud - - - 2022-08-17 + Discrimination + Something that acts as or causes Discrimination + + 2022-08-19 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog - - - IEC 31010:2019 - https://www.iso.org/standard/72140.html - - + + - - - Very High Risk - Level where Risk is Very High - - - 0.9,xsd:decimal - The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 - 2022-08-18 + caused by threat + Indicates the cause of associated context (subject) was the indicated threat (object) + + + 2024-02-14 accepted - Harshvardhan J. Pandit - - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + - + - High Risk (RM3x3 S:3 L:2) - Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High - - 0.67,xsd:decimal + Low Risk (RM5x5 S:1 L:4) + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low + + 0.16,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Sexual Violence - Something that acts as or causes Sexual Violence - - + + Extremely High Risk (RM7x7 S:5 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High + + 0.71,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Low Likelihood - Level where Likelihood is Low - - - - 0.25,xsd:decimal - The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 - 2022-08-18 + + Very High Risk (RM5x5 S:5 L:4) + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High + + 0.80,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + - Incident Preliminary Report - A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known - - - 2024-05-19 + + Operational Security Risk + Risks and issues that arise during operational processes + accepted - + - + - - Incident Mitigated - The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring - - 2024-02-14 + + Financial Impact + Things that cause or have the potential to impact financial resources + accepted - Harshvardhan J. Pandit - + - + - - Risk Matrix - Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other. - - - 2024-02-14 + + High Risk (RM7x7 S:3 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High + + 0.31,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + - - 3 Severity Levels - Scale with 3 Severity Levels from High to Low - + Risk Analysis + A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures + + + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - - Copyright Violation - Something that acts as or causes Copyright Violation - - + + High Risk (RM5x5 S:3 L:4) + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High + + 0.48,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - 3 Likelihood Levels - Scale with 3 Likelihood Levels from High to Low - - 2022-08-18 + + High Risk (RM7x7 S:4 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High + + 0.33,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + - - Recovery Control - Control to recover from event - - 2024-05-19 + + Moderate Risk (RM7x7 S:6 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate + + 0.24,xsd:decimal + 2022-08-17 accepted + Harshvardhan J. Pandit - - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + - + - Detriment - Something that acts as or causes Detriment - - 2022-03-23 + System Failure + Something that acts as or causes System Failure + + + Here system refers to both hardware and software systems + + 2022-08-17 2024-08-16 accepted - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves + Harshvardhan J. Pandit - + - - Societal Health & Safety - + + Moderate Severity + Level where Severity is Moderate + + + + 0.5,xsd:decimal + The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 + 2022-08-18 accepted + Harshvardhan J. Pandit - + - + - Very High Risk (RM7x7 S:6 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High - - 0.61,xsd:decimal + Risk Matrix 5x5 + A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types + 2022-08-17 accepted Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - - High Risk (RM5x5 S:5 L:2) - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High - - 0.40,xsd:decimal - 2022-08-17 + + Remove Consequence + Control that removes Consequence i.e. prevents it from materialising + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + - - Low Risk (RM7x7 S:3 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - - 0.18,xsd:decimal + + Sabotage + Something that acts as or causes Sabotage + + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Source Control - Risk Mitigation Measure that controls the Source - - 2024-05-19 + + Privacy + + accepted + + + + + + + + Low Risk (RM7x7 S:5 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low + + 0.20,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + - Cryptojacking - Something that acts as or causes Cryptojacking + Unauthorised Code Disclosure + Something that acts as or causes Unauthorised Code Disclosure + - + 2022-08-17 2024-08-16 accepted @@ -586,14 +562,15 @@ - + - Lose of Goodwill - Something that acts as or causes Loss of Goodwill - - + Violence against children + Something that acts as or causes Child Violence + + This concept was called "ChildViolence" in DPV 2.0 + 2022-08-17 2024-08-16 accepted @@ -601,12 +578,12 @@ - + - Low Risk (RM7x7 S:5 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low + Low Risk (RM7x7 S:2 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low 0.20,xsd:decimal 2022-08-17 @@ -615,28 +592,31 @@ - + - Low Risk (RM7x7 S:7 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low + Extremely Low Risk (RM7x7 S:1 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low - 0.14,xsd:decimal + 0.06,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Lose of Opportunity - Something that acts as or causes Loss of Opportunity - - + System Intrusion + Something that acts as or causes System Intrusion + + + + + 2022-08-17 2024-08-16 accepted @@ -644,56 +624,49 @@ - + - Component Malfunction - Something that acts as or causes Component Malfunction + Identity Fraud + Something that acts as or causes Identity Fraud + - Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of - accepted - - - - - - - - Unauthorised Activity - Something that acts as or causes Unauthorised Activity - + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - Moderate Risk (RM7x7 S:3 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate - - 0.24,xsd:decimal + Low Risk (RM3x3 S:2 L:1) + Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low + + 0.22,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Extremely Low Risk (RM7x7 S:1 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - - 0.02,xsd:decimal - 2022-08-17 + + Monitor Control + Risk Mitigation Measure that uses controls to monitor events + + Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised. + 2024-05-19 accepted Harshvardhan J. Pandit - + @@ -701,8 +674,9 @@ Unwanted Disclosure of Data Something that acts as or causes Unwanted Disclosure of Data + - + 2022-08-17 2024-08-16 accepted @@ -710,173 +684,211 @@ - + - Risk Matrix 5x5 - A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types - + Moderate Risk (RM7x7 S:3 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate + + 0.24,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Lose of Reputation - Something that acts as or causes Loss of Reputation - - + + Low Risk (RM7x7 S:3 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low + + 0.18,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - + - + + + + + + Risk Concepts + http://purl.org/ontology/bibo/status/published + RISK + Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management + 2022-08-14 + 2022-08-14 + 2024-07-13 + Harshvardhan J. Pandit + Georg P. Krog + Paul Ryan + Rob Brennan + Delaram Golpayegani + Beatriz Esteves + Julian Flake + 2.1-dev + 2.1-dev + https://w3id.org/dpv/risk + http://www.w3.org/2000/01/rdf-schema + http://www.w3.org/2004/02/skos/core + 10.5281/zenodo.12505841 + Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 + + + Delaram Golpayegani + Fajar Ekaputra + Rob Brennan + Julio Fernandez + Axel Polleres + Beatriz Esteves + Georg P. Krog + Julian Flake + Harshvardhan J. Pandit + + risk + https://w3id.org/dpv/risk# + + + + + + + + + + + + + - Payment - Something that acts as or provides payment e.g. to access a service or purchase resources - - 2024-04-14 + Unauthorised Data Access + Something that acts as or causes Unauthorised Data Access + + + + 2022-08-17 2024-08-16 accepted - Georg P. Krog, Harshvardhan J. Pandit + Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - - Data Breach - Something that acts as or causes Data Breach - - - 2022-08-17 - 2024-08-16 + Vulnerability + Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk + + 2024-02-14 accepted - Harshvardhan J. Pandit - - - + - + - Moderate Risk (RM7x7 S:7 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate + Extremely Low Risk (RM7x7 S:2 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low - 0.29,xsd:decimal + 0.08,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - - - - - Risk Concepts - Turtle serialiation - - + - - Extremely High Risk (RM7x7 S:5 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High - - 0.71,xsd:decimal - 2022-08-17 + Incident + An actual or occured event + + + + Incident is realised or materialised risk + 2024-02-14 + 2024-05-19 + 2024-08-16 accepted - Harshvardhan J. Pandit + Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez + + - + + - + - IEC 31010:2019 - https://www.iso.org/standard/72140.html + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - - Moderate Risk (RM7x7 S:4 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate - - 0.24,xsd:decimal + + Intercept Communications + Something that acts as or causes Interception of Communications + + + This concept was called "InterceptionCommunications" in DPV 2.0 + 2022-08-17 - accepted + 2024-08-16 + modified Harshvardhan J. Pandit - + - + - - 7 Likelihood Levels - Scale with 7 Likelihood Levels from Extremely High to Extremely Low - - 2022-08-18 + + Harm + Something that acts as or causes Harm to humans + + This concept refers to the general abstract notion of harm + 2022-08-13 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Extremely High Risk (RM7x7 S:7 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High - - 0.86,xsd:decimal + Moderate Risk (RM3x3 S:1 L:3) + Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate + + 0.33,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - - - Impact Control - Risk Mitigation Measure that controls Impacts - - 2024-05-19 - accepted - Harshvardhan J. Pandit - - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - Unauthorised Code Access - Something that acts as or causes Unauthorised Code Access - - + Financial Loss + Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity + + 2022-08-17 2024-08-16 accepted @@ -884,276 +896,215 @@ - + - - High Risk (RM7x7 S:4 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High - - 0.33,xsd:decimal - 2022-08-17 + + Intentional Misuse + Intentional Misuse + accepted - Harshvardhan J. Pandit - + - + - - Moderate Risk (RM5x5 S:2 L:4) - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate - - 0.32,xsd:decimal + + Extorsion + Something that acts as or causes Extorsion + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Violating Code of Conduct - Something that acts as or causes Violation of Code of Conduct - - This concept was called "ViolationCodeConduct" in DPV 2.0 - + Lose of Trust + Something that acts as or causes Loss of Trust + + 2022-08-17 2024-08-16 - modified + accepted Harshvardhan J. Pandit - + - Human Errors - Something that acts as or causes Human Errors - - + Violating Ethics Code + Something that acts as or causes Violation of Ethics Code + + This concept was called "ViolationEthicalCode" in DPV 2.0 + 2022-08-17 2024-08-16 - accepted + modified Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - - Moderate Risk - Level where Risk is Moderate - - - - 0.5,xsd:decimal - The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 - 2022-08-18 + + Identification Control + Control to identify characteristics of event + + 2024-05-19 accepted - Harshvardhan J. Pandit - + - + - - Very High Risk (RM7x7 S:6 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High - - 0.49,xsd:decimal + + Unauthorised Data Disclosure + Something that acts as or causes Unauthorised Data Disclosure + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + + + ENISa Trust Services Security Incidents 2021 + https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 + + - Intercept Communications - Something that acts as or causes Interception of Communications - - This concept was called "InterceptionCommunications" in DPV 2.0 - + Compromise Account Credentials + Something that acts as or causes Account Credentials to be compromised + + + 2022-08-17 2024-08-16 - modified + accepted Harshvardhan J. Pandit - + + + + Risk Assessment + Assessment of risk involving its identification, analysis, and evaluation + + + ISO 31073:2022 Risk management vocabulary + 2024-02-14 + accepted + + + + - Public Order Breach - Something that acts as or causes Public Order Breach + Detriment + Something that acts as or causes Detriment - - 2022-08-17 + 2022-03-23 2024-08-16 accepted - Harshvardhan J. Pandit + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves - + - Financial Impact - Things that cause or have the potential to impact financial resources - + Psychological Harm + Something that acts as or causes Psychological Harm + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - Low Risk (RM5x5 S:5 L:1) - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low + Moderate Risk (RM5x5 S:2 L:3) + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate - 0.20,xsd:decimal + 0.24,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Violation of Contractual Obligation - Something that acts as or causes Violation of Contractual Obligations + Copyright Violation + Something that acts as or causes Copyright Violation - This concept was called "ViolationContractualObligations" in DPV 2.0 - + 2022-08-17 2024-08-16 - modified + accepted Harshvardhan J. Pandit - - - - - Security Breach - Something that acts as or causes Security Breach - - - 2022-08-17 - 2024-08-16 - accepted - Harshvardhan J. Pandit - - - - - - - - Very Low Risk (RM7x7 S:1 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low - - 0.10,xsd:decimal - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Confidentiality Breach - Something that acts as or causes Confidentiality Breach - - - 2022-08-17 - 2024-08-16 - accepted - Harshvardhan J. Pandit - - - - - - - - Risk Matrix 3x3 - A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - Incident Assessment Report - A report describing the assessment of an incident in terms of its effects or impacts - - - 2024-05-19 - accepted - - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - Incident Mitigation Measure - A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again - - + Incident Impact Assessment + An impact assessment associated with a incident + + 2024-05-19 accepted + Harshvardhan J. Pandit - - - - - Reputational Risk - Risks and issues that affect the reputation of the organisation - - accepted - - - - + + - - Incident Report - Documented information about an incident, its handling, assessments,and notifications - - - 2024-05-19 + has risk source + Indicates the risk (subject) has the indicated risk source (object) + + + + + 2024-02-14 accepted - + @@ -1172,71 +1123,59 @@ - + - - 5 Likelihood Levels - Scale with 5 Likelihood Levels from Very High to Very Low - - 2022-08-18 + + Unauthorised Data Modification + Something that acts as or causes Unauthorised Data Modification + + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - + - - Low Risk (RM7x7 S:4 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low - - 0.16,xsd:decimal + + Exposure to Harmful Speech + Something that acts as or causes Harmful Speech + + This concept was called "HarmfulSpeech" in DPV 2.0 + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Damage - Something that acts as or causes Damage - - 2022-03-30 + Fraud + Something that acts as or causes Fraud + + + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - - - - is exploited by - Indicates the vulnerability (subject) is exploited by the indicated threat (object) - - - - - 2024-02-14 - accepted - - - - + - Confidentiality Incident - Incident where the confidentiality of information or system has been affected + Deliberate Incident + Incident caused due to deliberate actions of a human 2024-05-19 @@ -1244,49 +1183,44 @@ - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + + - - - Incident Near Miss - The state where an incident was almost successful in taking place i.e. "it came very close" - + has threat source + Indicates the threat (subject) has the indicated source (object) + + + + 2024-02-14 accepted - Harshvardhan J. Pandit - + - + - - Moderate Severity - Level where Severity is Moderate - - - - 0.5,xsd:decimal - The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 - 2022-08-18 + + Extremely High Risk (RM7x7 S:7 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High + + 0.71,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + - Unauthorised Data Disclosure - Something that acts as or causes Unauthorised Data Disclosure + Unwanted Data Deletion + Something that acts as or causes Unwanted Data Deletion + + - + 2022-08-17 2024-08-16 accepted @@ -1294,99 +1228,65 @@ - - - - - Monitor Control - Control that monitors another Control - - 2024-05-19 - accepted - Harshvardhan J. Pandit - - - - + - Financial Loss - Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity - - - 2022-08-17 + Non-Material Damage + Something that acts as or causes Non-Material Damage + + The criteria for what is considered material damage is based in jurisdictional laws and norms + 2022-03-30 2024-08-16 accepted Harshvardhan J. Pandit - + - - Moderate Risk (RM7x7 S:2 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate - - 0.29,xsd:decimal - 2022-08-17 + Risk Control + Control that modifies risk + + + 2024-05-19 accepted - Harshvardhan J. Pandit + - - - - - - - Erroneous System Use - Something that acts as or causes Erroneous System Use - - - 2022-08-17 - 2024-08-16 - accepted - Harshvardhan J. Pandit - - + - + - Incident Status - Status associated with an incident - - - 2024-02-14 + Incident Report + Documented information about an incident, its handling, assessments,and notifications + + + 2024-05-19 accepted - Harshvardhan J. Pandit - - - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + - + - - Change Impact - Control that changes Impact - - 2024-05-19 + + Public Order Breach + Something that acts as or causes Public Order Breach + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html @@ -1401,137 +1301,131 @@ - + + - - - Violation of Legal Obligations - Something that acts as or causes Violation of Legal Obligations - - This concept was called "ViolationRegulatoryObligations" in DPV 2.0 - - 2022-08-17 - 2024-08-16 - modified - Harshvardhan J. Pandit + caused by vulnerability + Indicates the associated context (subject) is caused by the indicated vulnerability (object) + + + 2024-02-14 + accepted - + - + - - Remove Source - Control that removes the risk source - - 2024-05-19 + + 3 Severity Levels + Scale with 3 Severity Levels from High to Low + + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - - Identification Control - Control to identify characteristics of event - - 2024-05-19 + + High Risk (RM7x7 S:6 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High + + 0.37,xsd:decimal + 2022-08-17 accepted + Harshvardhan J. Pandit - + - + - - Malware Attack - Something that acts as or causes Malware Attack - - + + Very High Risk (RM5x5 S:4 L:4) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High + + 0.64,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Low Risk (RM5x5 S:2 L:2) - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - - 0.16,xsd:decimal + + Denial of Service Attack (DoS) + Something that acts as or causes Denial of Service Attack (DoS) + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - - - - - - - Examples for Data Privacy Vocabulary - - + - + - - Reduce Severity - Control that reduces the severity of an event - - 2024-05-19 + + Compromise Account + Something that acts as or causes a compromised account that is then used by the compromiser + + + + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Threat - Risk source event which causes Risk - - + + Incident Ongoing + The incident is ongoing i.e. still active + 2024-02-14 accepted + Harshvardhan J. Pandit - + - + - - Very High Likelihood - Level where Likelihood is Very High - - - 0.9,xsd:decimal - The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 - 2022-08-18 + + High Risk (RM3x3 S:2 L:3) + Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High + + 0.67,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + - Risk Control - Control that modifies risk - - + Availability Incident + Incident where the availability of information or system has been affected + + 2024-05-19 accepted - - + @@ -1539,8 +1433,11 @@ Malicious Code Attack Something that acts as or causes Malicious Code Attack + + + - + 2022-08-17 2024-08-16 accepted @@ -1548,29 +1445,33 @@ - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - - Injury - Something that acts as or causes Injury - - - 2022-08-17 - 2024-08-16 + Incident Detection Report + A report describing the detection of a Incident + + + 2024-05-19 accepted - Harshvardhan J. Pandit - + - + - Authorisation Failure - Something that acts as or causes Authorisation Failure - - + Unwanted Code Deletion + Something that acts as or causes Unwanted Code Deletion + + + + 2022-08-17 2024-08-16 accepted @@ -1578,139 +1479,174 @@ - + - Extremely Low Risk (RM7x7 S:1 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low - - 0.04,xsd:decimal + High Risk (RM5x5 S:4 L:3) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + + 0.48,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - High Risk (RM5x5 S:2 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High - - 0.40,xsd:decimal - 2022-08-17 + + Re-identification + Something that acts as or causes Re-identification + + + Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification + 2022-08-19 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - - - - - Risk Concepts - http://purl.org/ontology/bibo/status/published - RISK - Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management - 2022-08-14 - 2022-08-14 - 2024-07-13 - Harshvardhan J. Pandit - Georg P. Krog - Paul Ryan - Rob Brennan - Delaram Golpayegani - Beatriz Esteves - Julian Flake - 2.1-dev - 2.1-dev - https://w3id.org/dpv/risk - http://www.w3.org/2000/01/rdf-schema - http://www.w3.org/2004/02/skos/core - 10.5281/zenodo.12505841 - Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 - - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + + Incident Concluded + The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring + + 2024-02-14 + accepted Harshvardhan J. Pandit - Georg P. Krog - Rob Brennan - Beatriz Esteves - Axel Polleres - Fajar Ekaputra - Delaram Golpayegani - Julian Flake - Julio Fernandez - - risk - https://w3id.org/dpv/risk# - - - - - - - - - - - + + - + - Prevent Exercising of Rights - Something that acts as or causes Prevent Exercising of Rights - - This concept was called "PreventExercisingOfRights" in DPV 2.0 - 2022-08-18 + Violation of Statutory Obligations + Something that acts as or causes Violation of Statutory Obligations + + This concept was called "ViolationStatutoryObligations" in DPV 2.0 + + 2022-08-17 2024-08-16 + modified + Harshvardhan J. Pandit + + + + + + + + Moderate Risk (RM5x5 S:3 L:2) + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate + + 0.24,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + + + + + + + Judicial Costs + Something that involves or causes judicial costs to be paid + accepted - Georg P. Krog, Harshvardhan J. Pandit - + + + + + Incident Suspected + The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing + + 2024-02-14 + accepted + Harshvardhan J. Pandit + + + + + + + + Extremely High Severity + Level where Severity is Extremely High + + 0.99,xsd:decimal + The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 + 2022-08-18 + accepted + Harshvardhan J. Pandit + + + + - Low Risk (RM3x3 S:2 L:1) - Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low - - 0.22,xsd:decimal + Very High Risk (RM7x7 S:7 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High + + 0.57,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - User Risks - Concepts associated with risks that arise due to User or Human use - + Component Failure + Something that acts as or causes Component Failure + + + Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of accepted - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + + High Risk (RM7x7 S:3 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High + + 0.37,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + - + - Extorsion - Something that acts as or causes Extorsion + Brute Force Authorisations + Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques + + - + 2022-08-17 2024-08-16 accepted @@ -1718,65 +1654,133 @@ - + + + + Incident Suspected Report + A report describing the suspicion of an incident in the past or occuring + + + 2024-05-19 + accepted + + + + + + + + Extremely High Risk (RM7x7 S:5 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High + + 0.61,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + + + + + + + Incident Mitigated + The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring + + 2024-02-14 + accepted + Harshvardhan J. Pandit + + + + - Violation of Statutory Obligations - Something that acts as or causes Violation of Statutory Obligations - - This concept was called "ViolationStatutoryObligations" in DPV 2.0 - + Lose of Negotiating Capacity + Something that acts as or causes Loss of Negotiating Capacity + + 2022-08-17 2024-08-16 - modified + accepted Harshvardhan J. Pandit - + + + + + Equipment Malfunction + Something that acts as or causes Equipment Malfunction + + + Here equipment refers to physical equipment + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + + + - Containment Control - Control to contain event - + Remove Source + Control that removes the risk source + 2024-05-19 accepted + Harshvardhan J. Pandit - - + + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - has control - Indicates the use of specified control - - + + + Risk Matrix + Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other. + + 2024-02-14 accepted + Harshvardhan J. Pandit - + - + - Threat Source - Source of threat event, including both agent and non-agent sources - - 2024-02-14 + Accidental Incident + Incident caused due to accidental actions arising from human or human-controlled situations + + + 2024-05-19 accepted - + - + - Distributed Denial of Service Attack (DDoS) - Something that acts as or causes Distributed Denial of Service Attack (DDoS) - - + Illegal Data Processing + Something that acts as or causes Illegal Processing of Data + + This concept was called "IllegalProcessingData" in DPV 2.0 + 2022-08-17 2024-08-16 accepted @@ -1784,18 +1788,20 @@ - - - - - Monitor Risk - Control that monitors a Risk - - 2024-05-19 + + + + + Lose of Customer Confidence + Something that acts as or causes Loss of Customer Confidence + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + @@ -1810,104 +1816,89 @@ - + - Lose of Credibility - Something that acts as or causes Loss of Credibility - - + Violating Code of Conduct + Something that acts as or causes Violation of Code of Conduct + + This concept was called "ViolationCodeConduct" in DPV 2.0 + 2022-08-17 2024-08-16 - accepted + modified Harshvardhan J. Pandit - - - - Incident Notice - Notice associated with an Incident - - - 2024-05-19 - accepted - - - - + - - Extremely High Likelihood - Level where Likelihood is Extremely High - - 0.99,xsd:decimal - The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 - 2022-08-18 + + Data Breach + Something that acts as or causes Data Breach + + + + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit + + - + - + - - Change Consequence - Control that changes Consequence - - 2024-05-19 + + Societal Health & Safety + accepted - Harshvardhan J. Pandit - + - + - - Low Risk (RM3x3 S:1 L:2) - Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low - - 0.22,xsd:decimal - 2022-08-17 + + Judicial Penalty + Something that involves or causes judicial penalties to be paid + accepted - Harshvardhan J. Pandit - + - + - - Very Low Risk (RM5x5 S:1 L:2) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low - - 0.08,xsd:decimal + + Unauthorised Code Access + Something that acts as or causes Unauthorised Code Access + + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - - - - - ENISA Threat Landscape 2021 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 + - + - Spoofing - Something that acts as or causes Spoofing + Phishing Scam + Something that acts as or causes Phishing Scam + - - - + 2022-08-17 2024-08-16 accepted @@ -1915,205 +1906,118 @@ - + - High Risk (RM7x7 S:3 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High + Extremely High Risk (RM7x7 S:6 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High - 0.31,xsd:decimal + 0.73,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Low Risk (RM7x7 S:2 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low - - 0.20,xsd:decimal + Low Risk (RM3x3 S:1 L:2) + Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low + + 0.22,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - - Availability Incident - Incident where the availability of information or system has been affected - - - 2024-05-19 - accepted - - - - - - - Incident Concluding Report - A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known - - - 2024-05-19 - accepted - - - - - - - - Detection Control - Control to detect event - - 2024-05-19 - accepted - - - - + - - Lose of Customer Confidence - Something that acts as or causes Loss of Customer Confidence - - + + High Risk (RM7x7 S:7 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High + + 0.43,xsd:decimal 2022-08-17 - 2024-08-16 - accepted - Harshvardhan J. Pandit - - - - - - - - Incident Terminated - The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring - - 2024-02-14 accepted Harshvardhan J. Pandit - + - + - High Risk (RM7x7 S:3 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High + Extremely Low Risk (RM7x7 S:2 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - 0.37,xsd:decimal + 0.04,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Psychological Harm - Something that acts as or causes Psychological Harm - - - 2022-08-17 - 2024-08-16 + + Monitor Risk Source + Control that monitors a Risk Source + + 2024-05-19 accepted Harshvardhan J. Pandit - - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + - + - Risk Analysis - A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures - - - + + Very High Risk + Level where Risk is Very High + + + 0.9,xsd:decimal + The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 2022-08-18 accepted Harshvardhan J. Pandit - - - - - - - Very High Risk (RM7x7 S:4 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High - - 0.49,xsd:decimal - 2022-08-17 - accepted - Harshvardhan J. Pandit - - + - + - - Very Low Risk (RM7x7 S:5 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low - - 0.10,xsd:decimal - 2022-08-17 + + 5 Likelihood Levels + Scale with 5 Likelihood Levels from Very High to Very Low + + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - Moderate Risk (RM7x7 S:6 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate + Extremely Low Risk (RM7x7 S:4 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low - 0.24,xsd:decimal + 0.08,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - - - High Likelihood - Level where Likelihood is High - - - - 0.75,xsd:decimal - The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 - 2022-08-18 - accepted - Harshvardhan J. Pandit - - - @@ -2128,85 +2032,99 @@ - + - - High Risk (RM5x5 S:3 L:4) - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - - 0.48,xsd:decimal + + Impact to Rights + Something that acts as or causes Impact to Rights + + + This concept was called "ImpactToRights" in DPV 2.0 + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - High Risk (RM3x3 S:2 L:3) - Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - - 0.67,xsd:decimal + + Scam + Something that acts as or causes Scam + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Violating Policy - Something that acts as or causes violation of policy which can be either internal or external policy - + System Malfunction + Something that acts as or causes System Malfunction + + + Here system refers to both hardware and software systems + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - - - Guides for Data Privacy Vocabulary - - + + + + + Risk Concepts - N3 serialiation - + - - Very Low Risk (RM7x7 S:1 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low - - 0.12,xsd:decimal - 2022-08-17 + + Social Disadvantage + Something that acts as or causes Social Disadvantage + + 2022-08-19 + 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog - + - + - - Privacy - + Environmental Incident + Incident caused due to environmental factors outside human controls + + + 2024-05-19 accepted - + - + - Vulnerability Created - Something that acts as or causes Vulnerability Created - - + Identity Theft + Something that acts as or causes Identity Theft + + + 2022-08-17 2024-08-16 accepted @@ -2214,63 +2132,111 @@ - + - Accidental Incident - Incident caused due to accidental actions arising from human or human-controlled situations - - - 2024-05-19 + Incident Status + Status associated with an incident + + + 2024-02-14 + accepted + Harshvardhan J. Pandit + + + + + + + + + Payment + Something that acts as or provides payment e.g. to access a service or purchase resources + + 2024-04-14 + 2024-08-16 accepted + Georg P. Krog, Harshvardhan J. Pandit - + - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - + Lose of Credibility + Something that acts as or causes Loss of Credibility + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - Very High Risk (RM7x7 S:5 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High + Very Low Risk (RM7x7 S:2 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low - 0.51,xsd:decimal + 0.12,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Moderate Risk (RM7x7 S:2 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate + Very Low Risk (RM5x5 S:2 L:1) + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low + + 0.08,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + + + + + + + Moderate Risk (RM7x7 S:2 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate - 0.24,xsd:decimal + 0.29,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Compromise Account - Something that acts as or causes a compromised account that is then used by the compromiser + Authorisation Failure + Something that acts as or causes Authorisation Failure + + - + 2022-08-17 2024-08-16 accepted @@ -2278,28 +2244,39 @@ - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - Risk Management - Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk - - ISO 31073:2022 Risk management vocabulary - 2024-06-12 + + Terrorism + Something that acts as or causes Terrorism + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - - - - - - - - - Risk Concepts - RDF/XML serialiation + - - + + + + + Benefit + Something that acts as or causes benefits + + 2022-03-23 + 2024-08-16 + accepted + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres + + @@ -2313,14 +2290,35 @@ accepted Harshvardhan J. Pandit - + + + + + + + + + Risk Concepts - RDF/XML serialiation + + + + + + 7 Risk Levels + Scale with 7 Risk Levels from Extremely High to Extremely Low + + 2022-08-18 + accepted + Harshvardhan J. Pandit + + - + - Low Risk (RM5x5 S:1 L:4) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low + Low Risk (RM5x5 S:2 L:2) + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low 0.16,xsd:decimal 2022-08-17 @@ -2329,168 +2327,174 @@ - + - Very High Risk (RM5x5 S:3 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High - - 0.60,xsd:decimal + Extremely High Risk (RM7x7 S:7 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High + + 0.86,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Unauthorised Re-Identification - Something that acts as or causes Unauthorised Re-Identification - - 2022-08-19 - 2024-08-16 + Threat + Risk source event which causes Risk + + + 2024-02-14 accepted - Georg P. Krog - + - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - - + + Extremely Low Likelihood + Level where Likelihood is Extremely Low + + 0.01,xsd:decimal + The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 + 2022-08-18 accepted + Harshvardhan J. Pandit - + - + - - Very High Risk (RM7x7 S:4 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High - - 0.57,xsd:decimal - 2022-08-17 + + Low Risk + Level where Risk is Low + + + + 0.25,xsd:decimal + The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - Equipment Malfunction - Something that acts as or causes Equipment Malfunction - - Here equipment refers to physical equipment - - 2022-08-17 - 2024-08-16 + Violating Policy + Something that acts as or causes violation of policy which can be either internal or external policy + accepted - Harshvardhan J. Pandit - + - - 7 Severity Levels - Scale with 7 Severity Levels from Extremely High to Extremely Low - + + Violation of Rights + Something that acts as or causes Violation of Rights + + This concept was called "ViolationOfRights" in DPV 2.0 2022-08-18 + 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog, Harshvardhan J. Pandit - + - + - - Unauthorised System Modification - Something that acts as or causes Unauthorised System Modification - - - 2022-08-17 - 2024-08-16 + + Monitor Impact + Control that monitors a Risk Impact + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + - - Extremely High Risk (RM7x7 S:7 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High - - 0.99,xsd:decimal - 2022-08-17 + + Security Attack + Something that acts as or causes an attack on security with the aim of undermining it + + + + accepted - Harshvardhan J. Pandit - + - - + - exploits vulnerability - Indicates the threat (subject) exploits the indicated vulnerability (object) - - - - - 2024-02-14 + + + Very Low Risk + Level where Risk is Very Low + + + 0.1,xsd:decimal + The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 + 2022-08-18 accepted + Harshvardhan J. Pandit - + - + - - System Failure - Something that acts as or causes System Failure - - Here system refers to both hardware and software systems - + + Moderate Risk (RM7x7 S:5 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate + + 0.31,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Unauthorised Information Disclosure - Something that acts as or causes Unauthorised Information Disclosure - - - 2022-08-17 - 2024-08-16 + + 5 Severity Levels + Scale with 5 Severity Levels from Very High to Very Low + + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - Unwanted Code Deletion - Something that acts as or causes Unwanted Code Deletion + Unauthorised Resource Use + Something that acts as or causes Unauthorised Resource Use + - + 2022-08-17 2024-08-16 accepted @@ -2498,106 +2502,94 @@ - + - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - - Denial of Service Attack (DoS) - Something that acts as or causes Denial of Service Attack (DoS) - - - + + Very High Risk (RM7x7 S:3 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High + + 0.43,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Unauthorised Data Access - Something that acts as or causes Unauthorised Data Access - - + Violation of Legal Obligations + Something that acts as or causes Violation of Legal Obligations + + This concept was called "ViolationRegulatoryObligations" in DPV 2.0 + 2022-08-17 2024-08-16 - accepted + modified Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - + - - 7 Risk Levels - Scale with 7 Risk Levels from Extremely High to Extremely Low - - 2022-08-18 + + Very High Risk (RM7x7 S:4 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High + + 0.57,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + - - - Low Risk (RM7x7 S:1 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low - - 0.14,xsd:decimal + + + Lose of Reputation + Something that acts as or causes Loss of Reputation + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Monitor Control - Risk Mitigation Measure that uses controls to monitor events - - Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised. + Incident Handling Report + A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence + + 2024-05-19 accepted - Harshvardhan J. Pandit - + - + - Unauthorised System Access - Something that acts as or causes Unauthorised System Access + Spoofing + Something that acts as or causes Spoofing + + - + + + 2022-08-17 2024-08-16 accepted @@ -2605,137 +2597,121 @@ - + + + + + Remuneration + Something that acts as or provides renumeration which is in monetary or financial form + + 2024-04-14 + 2024-08-16 + accepted + Georg P. Krog, Harshvardhan J. Pandit + + + + ENISA Reference Incident Classification Taxonomy 2018 https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - - Material Damage - Something that acts as or causes Material Damage - - The criteria for what is considered material damage is based in jurisdictional laws and norms - 2022-03-30 - 2024-08-16 + + Incident Status Unknown + The status of a incident is unknown + + 2024-02-14 accepted Harshvardhan J. Pandit - + - + - Unauthorised Code Modification - Something that acts as or causes Unauthorised Code Modification + Unauthorised Re-Identification + Something that acts as or causes Unauthorised Re-Identification + - - 2022-08-17 + 2022-08-19 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog - - - - Risk Assessment - Assessment of risk involving its identification, analysis, and evaluation - - - ISO 31073:2022 Risk management vocabulary - 2024-02-14 - accepted - - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - Moderate Risk (RM5x5 S:3 L:2) - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate + Very High Risk (RM5x5 S:4 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High - 0.24,xsd:decimal + 0.80,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - High Severity - Level where Severity is High - - - - 0.75,xsd:decimal - The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 - 2022-08-18 + + Monitor Consequence + Control that monitors a Risk Consequence + + 2024-05-19 accepted Harshvardhan J. Pandit - + - - - - - Very Low Risk (RM7x7 S:3 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low - - 0.12,xsd:decimal - 2022-08-17 - accepted - Harshvardhan J. Pandit - - + + + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - + - - System Malfunction - Something that acts as or causes System Malfunction - - Here system refers to both hardware and software systems - - 2022-08-17 - 2024-08-16 + Incident Notice + Notice associated with an Incident + + + 2024-05-19 accepted - Harshvardhan J. Pandit - + - + - Discrimination - Something that acts as or causes Discrimination - - 2022-08-19 - 2024-08-16 + Accidental Misuse + Accidental Misuse + accepted - Georg P. Krog - + - - Very Low Risk - Level where Risk is Very Low - - + + Very Low Likelihood + Level where Likelihood is Very Low + + 0.1,xsd:decimal The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 2022-08-18 @@ -2744,99 +2720,152 @@ - + - Moderate Risk (RM5x5 S:3 L:3) - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate + Very Low Risk (RM5x5 S:3 L:1) + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low - 0.36,xsd:decimal + 0.12,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + + + + Recovery Control + Control to recover from event + + 2024-05-19 + accepted + + + + - Very Low Risk (RM7x7 S:2 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low + Extremely Low Risk (RM7x7 S:1 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - 0.12,xsd:decimal + 0.02,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Re-identification - Something that acts as or causes Re-identification - - Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification - 2022-08-19 - 2024-08-16 + Reputational Risk + Risks and issues that affect the reputation of the organisation + accepted - Harshvardhan J. Pandit - + - Incident Impact Assessment - An impact assessment associated with a incident - - + + Moderate Risk (RM7x7 S:2 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate + + 0.24,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + + + + + + Incident Ongoing Report + A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated + + 2024-05-19 accepted - Harshvardhan J. Pandit - + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + + Low Likelihood + Level where Likelihood is Low + + + + 0.25,xsd:decimal + The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 + 2022-08-18 + accepted + Harshvardhan J. Pandit + + + + + + + + + + accepted + + - + - Reward - Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee - - 2024-04-14 + Injury + Something that acts as or causes Injury + + + 2022-08-17 2024-08-16 accepted - Georg P. Krog, Harshvardhan J. Pandit + Harshvardhan J. Pandit - + - Very High Risk (RM5x5 S:5 L:4) - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High - - 0.80,xsd:decimal + Moderate Risk (RM3x3 S:3 L:1) + Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate + + 0.33,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Equipment Failure - Something that acts as or causes Equipment Failure - - Here equipment refers to physical equipment - + Sexual Violence + Something that acts as or causes Sexual Violence + + 2022-08-17 2024-08-16 accepted @@ -2844,207 +2873,276 @@ - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - - Extremely High Risk (RM7x7 S:5 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High - - 0.61,xsd:decimal - 2022-08-17 + + Reduce Severity + Control that reduces the severity of an event + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + - - Violating Ethics Code - Something that acts as or causes Violation of Ethics Code - - This concept was called "ViolationEthicalCode" in DPV 2.0 - + + Very Low Risk (RM5x5 S:1 L:3) + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low + + 0.12,xsd:decimal 2022-08-17 - 2024-08-16 - modified + accepted Harshvardhan J. Pandit - + - + - - Incident Concluded - The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring - - 2024-02-14 + + Unauthorised System Access + Something that acts as or causes Unauthorised System Access + + + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Very High Risk (RM5x5 S:5 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High + Moderate Risk (RM5x5 S:4 L:2) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - 0.99,xsd:decimal + 0.32,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Low Severity - Level where Severity is Low - - - - 0.25,xsd:decimal - The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 - 2022-08-18 + + Unauthorised Code Modification + Something that acts as or causes Unauthorised Code Modification + + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Monitor Vulnerabilities - Control that monitors a Risk Vulnerability - + Reduction Control + Control that reduces the likelihood or severity of an event + 2024-05-19 accepted - Harshvardhan J. Pandit - + + + + Threat Source + Source of threat event, including both agent and non-agent sources + + 2024-02-14 + accepted + + + + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - Intentional Misuse - Intentional Misuse - + User Risks + Concepts associated with risks that arise due to User or Human use + accepted - + - Unauthorised Code Disclosure - Something that acts as or causes Unauthorised Code Disclosure - - - 2022-08-17 + Material Damage + Something that acts as or causes Material Damage + + The criteria for what is considered material damage is based in jurisdictional laws and norms + 2022-03-30 2024-08-16 accepted Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + exploits vulnerability + Indicates the threat (subject) exploits the indicated vulnerability (object) + + + + + 2024-02-14 + accepted + + - + - - System Intrusion - Something that acts as or causes System Intrusion - - - 2022-08-17 - 2024-08-16 + Individual Risk + Risks and issues that affect or have the potential to affect specific individuals accepted - Harshvardhan J. Pandit - + - Physical Harm - + Unauthorised System Modification + Something that acts as or causes Unauthorised System Modification + + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - has incident - Indicates an incident is associated with the specified context - - + is exploited by + Indicates the vulnerability (subject) is exploited by the indicated threat (object) + + + + 2024-02-14 accepted - + - Share Risk - Risk Mitigation Measure that shares Risk e.g. amongst stakeholders + Detection Control + Control to detect event 2024-05-19 accepted - Harshvardhan J. Pandit - + + + + + Low Risk (RM7x7 S:2 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low + + 0.16,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + + + + + + + Very High Risk (RM7x7 S:6 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High + + 0.61,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + + + - Reduce Likelihood - Control that reduces the likelihood of an event - + Containment Control + Control to contain event + 2024-05-19 accepted - Harshvardhan J. Pandit - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + + + Very High Risk (RM7x7 S:6 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High + + 0.49,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + + + - Impact to Rights - Something that acts as or causes Impact to Rights - - - This concept was called "ImpactToRights" in DPV 2.0 - + Human Errors + Something that acts as or causes Human Errors + + 2022-08-17 2024-08-16 accepted @@ -3052,131 +3150,115 @@ - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - - - Primer for Data Privacy Vocabulary - - - - - - - - Reduction Control - Control that reduces the likelihood or severity of an event - - 2024-05-19 - accepted - - - - + - Brute Force Authorisations - Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques + Unauthorised Activity + Something that acts as or causes Unauthorised Activity + + + - - 2022-08-17 - 2024-08-16 accepted - Harshvardhan J. Pandit - + - Incident - An actual or occured event - - - - Incident is realised or materialised risk - 2024-02-14 + + Remove Impact + Control that removes Impact i.e. prevents it from materialising + 2024-05-19 - 2024-08-16 accepted - Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez - - + Harshvardhan J. Pandit - - + - + - - Judicial Costs - Something that involves or causes judicial costs to be paid - + + Incident Near Miss + The state where an incident was almost successful in taking place i.e. "it came very close" + + 2024-02-14 accepted + Harshvardhan J. Pandit - + - + - - Data Corruption - Something that acts as or causes Corruption of Data - - This concept was called "Corruption Data" in DPV 2.0 - - 2022-08-17 - 2024-08-16 - modified + + High Severity + Level where Severity is High + + + + 0.75,xsd:decimal + The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 + 2022-08-18 + accepted Harshvardhan J. Pandit - + - + - Moderate Risk (RM3x3 S:1 L:3) - Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate - - 0.33,xsd:decimal + Low Risk (RM5x5 S:5 L:1) + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low + + 0.20,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + - - Identity Fraud - Something that acts as or causes Identity Fraud - - + + Low Risk (RM7x7 S:4 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low + + 0.16,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Illegal Data Processing - Something that acts as or causes Illegal Processing of Data - - This concept was called "IllegalProcessingData" in DPV 2.0 - + Coercion + Something that acts as or causes Coercion + + + 2022-08-17 2024-08-16 accepted @@ -3184,99 +3266,123 @@ - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - - Fee - Something that acts as or provides fees e.g. for using a service - - DGA 2.10 - 2024-04-14 - 2024-08-16 - modified - Georg P. Krog, Harshvardhan J. Pandit + Integrity Incident + Incident where the integrity of information or system has been affected + + + 2024-05-19 + accepted - + - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - - Very High Risk (RM7x7 S:3 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High - - 0.43,xsd:decimal + + Equipment Failure + Something that acts as or causes Equipment Failure + + + Here equipment refers to physical equipment + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Very Low Risk (RM5x5 S:1 L:1) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low - - 0.04,xsd:decimal + Low Risk (RM3x3 S:1 L:1) + Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low + + 0.11,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - Coercion - Something that acts as or causes Coercion - - - 2022-08-17 + Damage + Something that acts as or causes Damage + + 2022-03-30 2024-08-16 accepted Harshvardhan J. Pandit - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - - High Risk (RM3x3 S:3 L:3) - Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High - - 0.99,xsd:decimal - 2022-08-17 + + Avoid Source + Control that avoids the risk source + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + - - Consequence Control - Risk Mitigation Measure that controls the Consequences - - 2024-05-19 + + Low Risk (RM5x5 S:1 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low + + 0.20,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + - Blackmail - Something that acts as or causes Blackmail - - + Lose of Opportunity + Something that acts as or causes Loss of Opportunity + + 2022-08-17 2024-08-16 accepted @@ -3284,69 +3390,63 @@ - + - Extremely High Risk (RM7x7 S:6 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High - - 0.73,xsd:decimal + Risk Matrix 7x7 + A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types + 2022-08-17 accepted Harshvardhan J. Pandit - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - Moderate Risk (RM5x5 S:2 L:3) - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate - - 0.24,xsd:decimal + Very Low Risk (RM7x7 S:1 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low + + 0.12,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Low Risk - Level where Risk is Low - - - - 0.25,xsd:decimal - The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 - 2022-08-18 + + High Risk (RM3x3 S:3 L:2) + Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + + 0.67,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - + - Scam - Something that acts as or causes Scam + Malware Attack + Something that acts as or causes Malware Attack + + + - + 2022-08-17 2024-08-16 accepted @@ -3354,111 +3454,93 @@ - - - - - Remove Impact - Control that removes Impact i.e. prevents it from materialising - - 2024-05-19 - accepted - Harshvardhan J. Pandit - - - - + - Extremely Low Risk (RM7x7 S:3 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - - 0.06,xsd:decimal + High Risk (RM3x3 S:3 L:3) + Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High + + 0.99,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - + - - External Security Threat - Concepts associated with security threats that are likely to originate externally - + + Remedy Control + Control to remedy consequences of event + + 2024-05-19 accepted - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - - + - has threat source - Indicates the threat (subject) has the indicated source (object) - - - - - 2024-02-14 + + + Low Risk (RM5x5 S:4 L:1) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low + + 0.16,xsd:decimal + 2022-08-17 accepted + Harshvardhan J. Pandit - + - + - Low Risk (RM7x7 S:2 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low - - 0.16,xsd:decimal + Moderate Risk (RM3x3 S:2 L:2) + Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate + + 0.44,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - Very Low Risk (RM5x5 S:2 L:1) - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low + Very High Risk (RM5x5 S:5 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High - 0.08,xsd:decimal + 0.99,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + + + + Reward + Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + + 2024-04-14 + 2024-08-16 + accepted + Georg P. Krog, Harshvardhan J. Pandit + + + + - caused by vulnerability - Indicates the associated context (subject) is caused by the indicated vulnerability (object) + has vulnerability + Indicates the associated context (subject) has indicated vulnerability (object) 2024-02-14 @@ -3466,157 +3548,158 @@ - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - - Extremely Low Risk (RM7x7 S:1 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low - - 0.06,xsd:decimal - 2022-08-17 + + 7 Severity Levels + Scale with 7 Severity Levels from Extremely High to Extremely Low + + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - Integrity Incident - Incident where the integrity of information or system has been affected - - - 2024-05-19 + + High Risk (RM5x5 S:5 L:2) + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High + + 0.40,xsd:decimal + 2022-08-17 accepted + Harshvardhan J. Pandit - + - + - - Terrorism - Something that acts as or causes Terrorism - - + + High Risk (RM5x5 S:2 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High + + 0.40,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - + - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - - Unauthorised Resource Use - Something that acts as or causes Unauthorised Resource Use - - - 2022-08-17 - 2024-08-16 + + High Risk + Level where Risk is High + + + + 0.75,xsd:decimal + The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - - High Risk (RM5x5 S:4 L:3) - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High - - 0.48,xsd:decimal - 2022-08-17 + + Monitor Risk + Control that monitors a Risk + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - Low Risk (RM5x5 S:4 L:1) - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low + Moderate Risk (RM5x5 S:3 L:3) + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate - 0.16,xsd:decimal + 0.36,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Violence against children - Something that acts as or causes Child Violence - - This concept was called "ChildViolence" in DPV 2.0 - + + Risk Matrix 3x3 + A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types + 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - - - - - - caused by threat - Indicates the cause of associated context (subject) was the indicated threat (object) - - - 2024-02-14 - accepted - - + - + - Extremely Low Risk (RM7x7 S:4 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low + Extremely Low Risk (RM7x7 S:3 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - 0.08,xsd:decimal + 0.06,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - + - is vulnerability of - Indicates the vulnerability (subject) is associated with indicated context (object) - - - 2024-02-14 + + Incident Register + A register recording incidentes, their reports, notifications, and other related activities + + + 2024-05-19 accepted + Harshvardhan J. Pandit - + - + + + + + + + Risk Concepts - JSON-LD serialiation + + - Unauthorised Access to Premises - Something that acts as or causes Unauthorised Access to Premises - - + Confidentiality Breach + Something that acts as or causes Confidentiality Breach + + + 2022-08-17 2024-08-16 accepted @@ -3624,238 +3707,232 @@ - + - Individual Risk - Risks and issues that affect or have the potential to affect specific individuals + Incident Preliminary Report + A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known + + + 2024-05-19 accepted - + - + - - Component Failure - Something that acts as or causes Component Failure - - Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of + + Low Risk (RM7x7 S:7 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low + + 0.14,xsd:decimal + 2022-08-17 accepted + Harshvardhan J. Pandit - + - + - - Incident Halted - The incident has halted or paused with a high likelihood of resuming or recurring - - 2024-02-14 + + Very High Risk (RM7x7 S:4 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High + + 0.49,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + - Misuse - Something that acts as or causes Misuse - - 2024-06-11 + Lose of Goodwill + Something that acts as or causes Loss of Goodwill + + + 2022-08-17 2024-08-16 accepted - Delaram Golpayegani + Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - refers to risk - Indicates the incident (subject) is a materialisation of the indicated risk (object) - - - - - 2024-02-14 - accepted - - - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - - Extremely Low Severity - Level where Severity is Extremely Low - - 0.01,xsd:decimal - The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 + + Limitation of Rights + Something that acts as or causes Limitation of Rights + + This concept was called "LimitationOfRights" in DPV 2.0 2022-08-18 + 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog, Harshvardhan J. Pandit - + - + - Environmental Risk - Risks and issues that have their origin in environment or can affect the environment at large + Legal Risk + Risks and issues that have their basis in legal requirements and enforcement accepted - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - - Monitor Risk Source - Control that monitors a Risk Source - - 2024-05-19 + + Personal Safety Endangerment + Something that acts as or causes Personal Safety Endangerment + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Benefit - Something that acts as or causes benefits - - 2022-03-23 - 2024-08-16 + Physical Harm + accepted - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres - + - - Low Risk (RM5x5 S:1 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low - - 0.20,xsd:decimal - 2022-08-17 + + 3 Likelihood Levels + Scale with 3 Likelihood Levels from High to Low + + 2022-08-18 accepted Harshvardhan J. Pandit - + - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - - High Risk - Level where Risk is High - - - - 0.75,xsd:decimal - The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 - 2022-08-18 + + Low Risk (RM7x7 S:1 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low + + 0.14,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + - Very Low Risk (RM7x7 S:1 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low + Extremely High Risk (RM7x7 S:7 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High - 0.08,xsd:decimal + 0.99,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Violation of Rights - Something that acts as or causes Violation of Rights - - This concept was called "ViolationOfRights" in DPV 2.0 - 2022-08-18 + Erroneous System Use + Something that acts as or causes Erroneous System Use + + + 2022-08-17 2024-08-16 accepted - Georg P. Krog, Harshvardhan J. Pandit + Harshvardhan J. Pandit - + - Monitor Consequence - Control that monitors a Risk Consequence - + Reduce Likelihood + Control that reduces the likelihood of an event + 2024-05-19 accepted Harshvardhan J. Pandit - + - Remove Consequence - Control that removes Consequence i.e. prevents it from materialising - + Monitor Vulnerabilities + Control that monitors a Risk Vulnerability + 2024-05-19 accepted Harshvardhan J. Pandit - + + + + + Very High Severity + Level where Severity is Very High + + + 0.9,xsd:decimal + The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 + 2022-08-18 + accepted + Harshvardhan J. Pandit + + + + - Harm - Something that acts as or causes Harm to humans - - This concept refers to the general abstract notion of harm - 2022-08-13 + Compensation + Something that acts as or provides compensation - which can be monetary and financial or in other forms + + 2024-04-14 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog, Harshvardhan J. Pandit + + + @@ -3870,57 +3947,15 @@ - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - Vulnerability - Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk - - 2024-02-14 - accepted - - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - Societal Risk - Risks and issues that affect or have the potential to affect society at large or specific groups in society - - accepted - - - - - - - - Judicial Penalty - Something that involves or causes judicial penalties to be paid - - accepted - - - - + - Lose of Trust - Something that acts as or causes Loss of Trust - - + Unauthorised Information Disclosure + Something that acts as or causes Unauthorised Information Disclosure + + + 2022-08-17 2024-08-16 accepted @@ -3928,203 +3963,163 @@ - - - - - Compensation - Something that acts as or provides compensation - which can be monetary and financial or in other forms - - 2024-04-14 - 2024-08-16 - accepted - Georg P. Krog, Harshvardhan J. Pandit - - + + - + - Cross-Border Incident - Incident involving cross-border or multiple jurisdictions - - + + Change Consequence + Control that changes Consequence + 2024-05-19 accepted + Harshvardhan J. Pandit - + - + - - Incident Status Unknown - The status of a incident is unknown - - 2024-02-14 + + Extremely High Likelihood + Level where Likelihood is Extremely High + + 0.99,xsd:decimal + The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - - Extremely High Risk - Level where Risk is Extremely High - - 0.99,xsd:decimal - The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 + + Very High Likelihood + Level where Likelihood is Very High + + + 0.9,xsd:decimal + The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 2022-08-18 accepted Harshvardhan J. Pandit - + - High Risk (RM7x7 S:6 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High + Very Low Risk (RM7x7 S:5 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low - 0.37,xsd:decimal + 0.10,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ENISA Threat Landscape for Ransomware Attacks 2022 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - - - - - - Legal Risk - Risks and issues that have their basis in legal requirements and enforcement - - accepted - - - - + + - - - Internal Security Threat - Concepts associated with security threats and issues that originate within the organisation - + is vulnerability of + Indicates the vulnerability (subject) is associated with indicated context (object) + + + 2024-02-14 accepted - + - + - - Individual Health & Safety - + + Impact Control + Risk Mitigation Measure that controls Impacts + + 2024-05-19 accepted + Harshvardhan J. Pandit - + - + - - Extremely Low Risk - Level where Risk is Extremely Low - - 0.01,xsd:decimal - The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 - 2022-08-18 + + Very Low Risk (RM5x5 S:1 L:2) + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low + + 0.08,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + - - Non-Material Damage - Something that acts as or causes Non-Material Damage - - The criteria for what is considered material damage is based in jurisdictional laws and norms - 2022-03-30 - 2024-08-16 + + Very Low Risk (RM7x7 S:3 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low + + 0.12,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + - - Very High Severity - Level where Severity is Very High - - - 0.9,xsd:decimal - The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 + + 3 Risk Levels + Scale with 3 Risk Levels from High to Low + 2022-08-18 accepted Harshvardhan J. Pandit - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - - Unwanted Data Deletion - Something that acts as or causes Unwanted Data Deletion - - + + Moderate Risk (RM5x5 S:2 L:4) + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate + + 0.32,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - - - - - - - Remedy Control - Control to remedy consequences of event - - 2024-05-19 - accepted - - + - + - Exposure to Harmful Speech - Something that acts as or causes Harmful Speech - - This concept was called "HarmfulSpeech" in DPV 2.0 - + Security Breach + Something that acts as or causes Security Breach + + + + + 2022-08-17 2024-08-16 accepted @@ -4132,61 +4127,77 @@ - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - 5 Severity Levels - Scale with 5 Severity Levels from Very High to Very Low - + Low Severity + Level where Severity is Low + + + + 0.25,xsd:decimal + The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 2022-08-18 accepted Harshvardhan J. Pandit - + - - Monitor Impact - Control that monitors a Risk Impact - + + Environmental Risk + Risks and issues that have their origin in environment or can affect the environment at large + + accepted + + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + Confidentiality Incident + Incident where the confidentiality of information or system has been affected + + 2024-05-19 accepted - Harshvardhan J. Pandit - + - + - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - + - - Incident Suspected - The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing - - 2024-02-14 + + Extremely High Risk + Level where Risk is Extremely High + + 0.99,xsd:decimal + The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - High Risk (RM5x5 S:5 L:3) - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High + Very High Risk (RM5x5 S:3 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High 0.60,xsd:decimal 2022-08-17 @@ -4195,28 +4206,48 @@ - + - - Extremely Low Risk (RM7x7 S:2 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low - - 0.08,xsd:decimal - 2022-08-17 + + Individual Health & Safety + accepted - Harshvardhan J. Pandit - + - + + + + + Primer for Data Privacy Vocabulary + + + + + + + + + + Risk Concepts - Turtle serialiation + + + + + + Examples for Data Privacy Vocabulary + + + + - Limitation of Rights - Something that acts as or causes Limitation of Rights + Prevent Exercising of Rights + Something that acts as or causes Prevent Exercising of Rights - This concept was called "LimitationOfRights" in DPV 2.0 + This concept was called "PreventExercisingOfRights" in DPV 2.0 2022-08-18 2024-08-16 accepted @@ -4224,152 +4255,229 @@ - + + + + + Change Impact + Control that changes Impact + + 2024-05-19 + accepted + Harshvardhan J. Pandit + + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + Cross-Border Incident + Incident involving cross-border or multiple jurisdictions + + + 2024-05-19 + accepted + + + + + + IEC 31010:2019 + https://www.iso.org/standard/72140.html + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - Moderate Risk (RM5x5 S:4 L:2) - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - - 0.32,xsd:decimal + Moderate Risk (RM7x7 S:7 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate + + 0.29,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Very Low Likelihood - Level where Likelihood is Very Low - - - 0.1,xsd:decimal - The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 - 2022-08-18 + Incident Assessment Report + A report describing the assessment of an incident in terms of its effects or impacts + + + 2024-05-19 + accepted + + + + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + + + Guides for Data Privacy Vocabulary + + + + + + + Incident Concluding Report + A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known + + + 2024-05-19 accepted - Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - + - Sabotage - Something that acts as or causes Sabotage - - - 2022-08-17 + Misuse + Something that acts as or causes Misuse + + 2024-06-11 2024-08-16 accepted - Harshvardhan J. Pandit + Delaram Golpayegani - + - - 3 Risk Levels - Scale with 3 Risk Levels from High to Low - - 2022-08-18 + + External Security Threat + Concepts associated with security threats that are likely to originate externally + accepted - Harshvardhan J. Pandit - + - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + ENISA Threat Landscape for Ransomware Attacks 2022 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + + + + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - - Accidental Misuse - Accidental Misuse - + + Very Low Severity + Level where Severity is Very Low + + + 0.1,xsd:decimal + The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 + 2022-08-18 accepted + Harshvardhan J. Pandit - + - + - - Extremely High Risk (RM7x7 S:6 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High - - 0.86,xsd:decimal - 2022-08-17 + + Consequence Control + Risk Mitigation Measure that controls the Consequences + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + - - Very Low Risk (RM5x5 S:3 L:1) - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low - - 0.12,xsd:decimal + + Physical Assault + Something that acts as or causes Physical Assault + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Moderate Risk (RM3x3 S:3 L:1) - Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - - 0.33,xsd:decimal - 2022-08-17 + + + accepted - Harshvardhan J. Pandit - + - + - Incident Ongoing Report - A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated - - - 2024-05-19 + + Societal Risk + Risks and issues that affect or have the potential to affect society at large or specific groups in society + accepted - + - + - - Low Risk (RM3x3 S:1 L:1) - Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - - 0.11,xsd:decimal - 2022-08-17 + + Monitor Control + Control that monitors another Control + + 2024-05-19 accepted Harshvardhan J. Pandit - - - - - ENISa Trust Services Security Incidents 2021 - https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 + @@ -4384,400 +4492,332 @@ - + + + ENISA Threat Landscape 2021 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 + + - - Extremely Low Likelihood - Level where Likelihood is Extremely Low - - 0.01,xsd:decimal - The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 - 2022-08-18 + Risk Management + Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk + + ISO 31073:2022 Risk management vocabulary + 2024-06-12 accepted - Harshvardhan J. Pandit - + - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Threat Landscape for Ransomware Attacks 2022 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - + - Very High Risk (RM7x7 S:7 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High - - 0.57,xsd:decimal + High Risk (RM5x5 S:5 L:3) + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High + + 0.60,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + + IEC 31010:2019 + https://www.iso.org/standard/72140.html + + + + + + + + Risk Concepts - HTML serialiation + + - - Operational Security Risk - Risks and issues that arise during operational processes - + Incident Identifier + Identifier associated with an incident + + 2024-05-19 accepted - + - + + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + - Incident Register - A register recording incidentes, their reports, notifications, and other related activities - - + Incident Mitigation Measure + A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again + + 2024-05-19 accepted - Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + + Source Control + Risk Mitigation Measure that controls the Source + + 2024-05-19 + accepted + Harshvardhan J. Pandit + + - + - - Unauthorised Data Modification - Something that acts as or causes Unauthorised Data Modification - - - 2022-08-17 - 2024-08-16 + + High Likelihood + Level where Likelihood is High + + + + 0.75,xsd:decimal + The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - - Extremely High Severity - Level where Severity is Extremely High - - 0.99,xsd:decimal - The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 - 2022-08-18 + + Extremely Low Risk (RM7x7 S:1 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low + + 0.04,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - - - - + - + ENISA Methodology for Sectoral Cybersecurity Assessments https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - + - - Compromise Account Credentials - Something that acts as or causes Account Credentials to be compromised - - - 2022-08-17 - 2024-08-16 + + 7 Likelihood Levels + Scale with 7 Likelihood Levels from Extremely High to Extremely Low + + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - - Very Low Risk (RM5x5 S:1 L:3) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low - - 0.12,xsd:decimal - 2022-08-17 + + Incident Halted + The incident has halted or paused with a high likelihood of resuming or recurring + + 2024-02-14 accepted Harshvardhan J. Pandit - + - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + - - Incident Handling Report - A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence - - - 2024-05-19 + has incident + Indicates an incident is associated with the specified context + + + 2024-02-14 accepted - + - + + - - - High Risk (RM7x7 S:7 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High - - 0.43,xsd:decimal - 2022-08-17 + has control + Indicates the use of specified control + + + 2024-02-14 accepted - Harshvardhan J. Pandit - + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - ENISA Threat Landscape for Ransomware Attacks 2022 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - + - - Identity Theft - Something that acts as or causes Identity Theft - - - 2022-08-17 - 2024-08-16 + + Incident Terminated + The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring + + 2024-02-14 accepted Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - - - Risk Concepts - JSON-LD serialiation - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - + ENISA Reference Incident Classification Taxonomy 2018 https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + ENISA Threat Taxonomy 2016 https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - + + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - Incident Suspected Report - A report describing the suspicion of an incident in the past or occuring - - - 2024-05-19 + + Moderate Risk (RM7x7 S:4 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate + + 0.24,xsd:decimal + 2022-08-17 accepted + Harshvardhan J. Pandit - + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - - Incident Identifier - Identifier associated with an incident - - 2024-05-19 - accepted - - - - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - - Incident Detection Report - A report describing the detection of a Incident - - - 2024-05-19 - accepted - - - - + - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - - - - - - Risk Concepts - N3 serialiation + + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - - - - - Security Attack - Something that acts as or causes an attack on security with the aim of undermining it - - accepted - - - - + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - diff --git a/2.1-dev/risk/risk.ttl b/2.1-dev/risk/risk.ttl index 2c375f60a..bf771fc79 100644 --- a/2.1-dev/risk/risk.ttl +++ b/2.1-dev/risk/risk.ttl @@ -156,7 +156,9 @@ risk:AuthorisationFailure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Authorisation Failure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Authorisation Failure"@en . @@ -166,7 +168,8 @@ risk:AvailabilityBreach a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:DataBreach ; + skos:broader risk:AvailabilityConcept, + risk:DataBreach ; skos:inScheme risk:risk-consequences-classes . risk:AvailabilityIncident a rdfs:Class, @@ -216,7 +219,8 @@ risk:Blackmail a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Blackmail"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Blackmail"@en . @@ -232,7 +236,9 @@ risk:BruteForceAuthorisations a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Brute Force Authorisations"@en . @@ -272,7 +278,8 @@ risk:Coercion a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Coercion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Coercion"@en . @@ -295,7 +302,8 @@ risk:ComponentFailure a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Component Failure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Component Failure"@en ; @@ -306,7 +314,8 @@ risk:ComponentMalfunction a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Component Malfunction"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Component Malfunction"@en ; @@ -323,7 +332,10 @@ risk:CompromiseAccount a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Compromise Account"@en . @@ -339,7 +351,8 @@ risk:CompromiseAccountCredentials a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:ConfidentialityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Compromise Account Credentials"@en . @@ -355,7 +368,8 @@ risk:ConfidentialityBreach a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:DataBreach ; + skos:broader risk:ConfidentialityConcept, + risk:DataBreach ; skos:definition "Something that acts as or causes Confidentiality Breach"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Confidentiality Breach"@en . @@ -432,7 +446,8 @@ risk:Cryptojacking a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Cryptojacking"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Cryptojacking"@en . @@ -463,7 +478,10 @@ risk:DataBreach a rdfs:Class, dex:E0071 ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SecurityBreach ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:SecurityBreach ; skos:definition "Something that acts as or causes Data Breach"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Data Breach"@en . @@ -479,7 +497,8 @@ risk:DataCorruption a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:IntegrityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Corruption of Data"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Data Corruption"@en ; @@ -503,14 +522,12 @@ risk:DenialServiceAttack a rdfs:Class, dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ], - [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Denial of Service Attack (DoS)"@en . @@ -563,7 +580,8 @@ risk:DistributedDenialServiceAttack a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en . @@ -600,7 +618,8 @@ risk:EquipmentFailure a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Equipment Failure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Equipment Failure"@en ; @@ -617,7 +636,8 @@ risk:EquipmentMalfunction a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Equipment Malfunction"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Equipment Malfunction"@en ; @@ -677,7 +697,8 @@ risk:Extorsion a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Extorsion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Extorsion"@en . @@ -817,7 +838,8 @@ risk:Fraud a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Fraud"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Fraud"@en . @@ -934,7 +956,8 @@ risk:IdentityFraud a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:ConfidentialityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Identity Fraud"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Identity Fraud"@en . @@ -950,7 +973,8 @@ risk:IdentityTheft a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:ConfidentialityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Identity Theft"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Identity Theft"@en . @@ -1294,7 +1318,8 @@ risk:IntegrityBreach a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:DataBreach ; + skos:broader risk:DataBreach, + risk:IntegrityConcept ; skos:inScheme risk:risk-consequences-classes . risk:IntegrityIncident a rdfs:Class, @@ -1329,22 +1354,13 @@ risk:InterceptCommunications a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Interception of Communications"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Intercept Communications"@en ; skos:scopeNote "This concept was called \"InterceptionCommunications\" in DPV 2.0"@en . -risk:InternalSecurityThreat a rdfs:Class, - skos:Concept, - dpv:RiskConcept ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader dpv:RiskConcept ; - skos:definition "Concepts associated with security threats and issues that originate within the organisation"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Internal Security Threat"@en . - risk:JudicialCosts a rdfs:Class, skos:Concept, dpv:RiskConcept ; @@ -1546,7 +1562,10 @@ risk:MaliciousCodeAttack a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Malicious Code Attack"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Malicious Code Attack"@en . @@ -1562,7 +1581,10 @@ risk:MalwareAttack a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Malware Attack"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Malware Attack"@en . @@ -1791,7 +1813,8 @@ risk:PhishingScam a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Phishing Scam"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Phishing Scam"@en . @@ -2995,7 +3018,8 @@ risk:Reidentification a rdfs:Class, dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:ConfidentialityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Re-identification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Re-identification"@en ; @@ -3268,7 +3292,9 @@ risk:Sabotage a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Sabotage"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Sabotage"@en . @@ -3284,7 +3310,8 @@ risk:Scam a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Scam"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Scam"@en . @@ -3294,7 +3321,10 @@ risk:SecurityAttack a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Security Attack"@en . @@ -3310,7 +3340,10 @@ risk:SecurityBreach a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Security Breach"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Security Breach"@en . @@ -3401,7 +3434,9 @@ risk:Spoofing a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat, + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept, risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Spoofing"@en ; skos:inScheme risk:risk-consequences-classes ; @@ -3418,7 +3453,8 @@ risk:SystemFailure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes System Failure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "System Failure"@en ; @@ -3435,7 +3471,10 @@ risk:SystemIntrusion a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes System Intrusion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "System Intrusion"@en . @@ -3451,7 +3490,8 @@ risk:SystemMalfunction a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes System Malfunction"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "System Malfunction"@en ; @@ -3505,7 +3545,10 @@ risk:UnauthorisedAccesstoPremises a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Access to Premises"@en . @@ -3515,7 +3558,10 @@ risk:UnauthorisedActivity a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised Activity"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Activity"@en . @@ -3531,7 +3577,9 @@ risk:UnauthorisedCodeAccess a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised Code Access"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Code Access"@en . @@ -3547,7 +3595,8 @@ risk:UnauthorisedCodeDisclosure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Code Disclosure"@en . @@ -3563,7 +3612,8 @@ risk:UnauthorisedCodeModification a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Code Modification"@en . @@ -3579,7 +3629,8 @@ risk:UnauthorisedDataAccess a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Data Access"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Data Access"@en . @@ -3595,7 +3646,8 @@ risk:UnauthorisedDataDisclosure a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Data Disclosure"@en . @@ -3611,7 +3663,8 @@ risk:UnauthorisedDataModification a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Data Modification"@en . @@ -3627,7 +3680,8 @@ risk:UnauthorisedInformationDisclosure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Information Disclosure"@en . @@ -3640,7 +3694,8 @@ risk:UnauthorisedReidentification a rdfs:Class, dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Re-Identification"@en . @@ -3656,7 +3711,8 @@ risk:UnauthorisedResourceUse a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Resource Use"@en . @@ -3672,7 +3728,9 @@ risk:UnauthorisedSystemAccess a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised System Access"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised System Access"@en . @@ -3688,7 +3746,8 @@ risk:UnauthorisedSystemModification a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised System Modification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised System Modification"@en . @@ -3704,7 +3763,9 @@ risk:UnwantedCodeDeletion a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unwanted Code Deletion"@en . @@ -3720,7 +3781,9 @@ risk:UnwantedDataDeletion a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unwanted Data Deletion"@en . @@ -3736,7 +3799,8 @@ risk:UnwantedDisclosureData a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unwanted Disclosure of Data"@en . @@ -3963,22 +4027,6 @@ risk:Vulnerability a rdfs:Class, skos:inScheme risk:core-classes ; skos:prefLabel "Vulnerability"@en . -risk:VulnerabilityCreated a rdfs:Class, - skos:Concept, - dpv:RiskConcept ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:modified "2024-08-16"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:InternalSecurityThreat ; - skos:definition "Something that acts as or causes Vulnerability Created"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Vulnerability Created"@en . - a owl:Ontology, profile:Profile ; dct:bibliographicCitation "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" ; diff --git a/code/jinja2_resources/template_risk.jinja2 b/code/jinja2_resources/template_risk.jinja2 index 1bddfa7e6..0f3a4c9a9 100644 --- a/code/jinja2_resources/template_risk.jinja2 +++ b/code/jinja2_resources/template_risk.jinja2 @@ -227,60 +227,64 @@ ex:ProcessB a dpv:Process ; dpv:hasImpact risk:RightsImpact . -

The risk concepts taxonomy is broadly divided into the following categories:

+

The concepts taxonomy is broadly divided into the following categories:

-
-

InternalSecurityThreat

- {{ list_hierarchy(modules['risk_consequences']['classes'], head='risk:InternalSecurityThreat') }} -
-
-

UserRisks

- {{ list_hierarchy(modules['risk_consequences']['classes'], head='risk:UserRisks') }} -
-
-

ExternalSecurityThreat

- {{ list_hierarchy(modules['risk_consequences']['classes'], head='risk:ExternalSecurityThreat') }} -
-
-

OperationalSecurityRisk

- {{ list_hierarchy(modules['risk_consequences']['classes'], head='risk:OperationalSecurityRisk') }} -
-
-

LegalRisk

- {{ list_hierarchy(modules['risk_consequences']['classes'], head='risk:LegalRisk') }} -
-
-

ReputationalRisk

- {{ list_hierarchy(modules['risk_consequences']['classes'], head='risk:ReputationalRisk') }} -
-
-

SocietalRisk

- {{ list_hierarchy(modules['risk_consequences']['classes'], head='risk:SocietalRisk') }} -
-
-

IndividualRisk

- {{ list_hierarchy(modules['risk_consequences']['classes'], head='risk:IndividualRisk') }} -
-
-

EnvironmentalRisk

- {{ list_hierarchy(modules['risk_consequences']['classes'], head='risk:EnvironmentalRisk') }} -
-
-

FinancialImpact

- {{ list_hierarchy(modules['risk_consequences']['classes'], head='risk:FinancialImpact') }} -
+
+

CIA Model

+

Confidentiality

+ {{ list_hierarchy(modules['risk_consequences']['classes'], head='risk:ConfidentialityConcept') }} + +

Integrity

+ {{ list_hierarchy(modules['risk_consequences']['classes'], head='risk:IntegrityConcept') }} + +

Availability

+ {{ list_hierarchy(modules['risk_consequences']['classes'], head='risk:AvailabilityConcept') }} +
+ +
+

User

+ {{ list_hierarchy(modules['risk_consequences']['classes'], head='risk:UserRisks') }} +
+ +
+

Legal

+ {{ list_hierarchy(modules['risk_consequences']['classes'], head='risk:LegalRisk') }} +
+ +
+

Reputational

+ {{ list_hierarchy(modules['risk_consequences']['classes'], head='risk:ReputationalRisk') }} +
+ +
+

Societal

+ {{ list_hierarchy(modules['risk_consequences']['classes'], head='risk:SocietalRisk') }} +
+ +
+

Individual

+ {{ list_hierarchy(modules['risk_consequences']['classes'], head='risk:IndividualRisk') }} +
+ +
+

Environmental

+ {{ list_hierarchy(modules['risk_consequences']['classes'], head='risk:EnvironmentalRisk') }} +
+ +
+

Financial

+ {{ list_hierarchy(modules['risk_consequences']['classes'], head='risk:FinancialImpact') }} +
diff --git a/code/vocab_csv/RiskConsequences.csv b/code/vocab_csv/RiskConsequences.csv index 42df0f08b..00ab0f50f 100644 --- a/code/vocab_csv/RiskConsequences.csv +++ b/code/vocab_csv/RiskConsequences.csv @@ -1,995 +1,991 @@ -Term,Label,Definition,ParentTerm,ParentType,Value,RelatedTerms,Relation,Usage,Source,Created,Modified,Status,Contributors,Resolution,,,,,,,,,,,,,,,,, -InternalSecurityThreat,Internal Security Threat,Concepts associated with security threats and issues that originate within the organisation,,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -VulnerabilityCreated,Vulnerability Created,Something that acts as or causes Vulnerability Created,risk:InternalSecurityThreat,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -UserRisks,User Risks,Concepts associated with risks that arise due to User or Human use,,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -Misuse,Misuse,Something that acts as or causes Misuse,risk:UserRisks,dpv:RiskConcept,,,,,,2024-06-11,2024-08-16,accepted,Delaram Golpayegani,,,,,,,,,,,,,,,,,, -IntentionalMisuse,Intentional Misuse,Intentional Misuse,risk:UserRisks,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -AccidentalMisuse,Accidental Misuse,Accidental Misuse,risk:UserRisks,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -ErroneousSystemUse,Erroneous System Use,Something that acts as or causes Erroneous System Use,risk:UserRisks,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -HumanErrors,Human Errors,Something that acts as or causes Human Errors,risk:UserRisks,dpv:RiskConcept,,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +Term,Label,Definition,ParentTerm,ParentType,Value,CIA,RelatedTerms,Relation,Usage,Source,Created,Modified,Status,Contributors,Resolution,,,,,,,,,,,,,,,,, +UserRisks,User Risks,Concepts associated with risks that arise due to User or Human use,,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +Misuse,Misuse,Something that acts as or causes Misuse,risk:UserRisks,dpv:RiskConcept,,,,,,,2024-06-11,2024-08-16,accepted,Delaram Golpayegani,,,,,,,,,,,,,,,,,, +IntentionalMisuse,Intentional Misuse,Intentional Misuse,risk:UserRisks,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +AccidentalMisuse,Accidental Misuse,Accidental Misuse,risk:UserRisks,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +ErroneousSystemUse,Erroneous System Use,Something that acts as or causes Erroneous System Use,risk:UserRisks,dpv:RiskConcept,,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +HumanErrors,Human Errors,Something that acts as or causes Human Errors,risk:UserRisks,dpv:RiskConcept,,,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -ExternalSecurityThreat,External Security Threat,Concepts associated with security threats that are likely to originate externally,,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -SecurityAttack,Security Attack,Something that acts as or causes an attack on security with the aim of undermining it,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -Cryptojacking,Cryptojacking,Something that acts as or causes Cryptojacking,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ENISA Threat Landscape 2021,https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -DenialServiceAttack,Denial of Service Attack (DoS),Something that acts as or causes Denial of Service Attack (DoS),risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -DenialServiceAttack,Denial of Service Attack (DoS),Something that acts as or causes Denial of Service Attack (DoS),risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -DistributedDenialServiceAttack,Distributed Denial of Service Attack (DDoS),Something that acts as or causes Distributed Denial of Service Attack (DDoS),risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -BruteForceAuthorisations,Brute Force Authorisations,Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -MaliciousCodeAttack,Malicious Code Attack,Something that acts as or causes Malicious Code Attack,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -MalwareAttack,Malware Attack,Something that acts as or causes Malware Attack,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ENISA Methodology for Sectoral Cybersecurity Assessments,https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -SystemIntrusion,System Intrusion,Something that acts as or causes System Intrusion,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnauthorisedActivity,Unauthorised Activity,Something that acts as or causes Unauthorised Activity,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -UnauthorisedAccesstoPremises,Unauthorised Access to Premises,Something that acts as or causes Unauthorised Access to Premises,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnauthorisedCodeAccess,Unauthorised Code Access,Something that acts as or causes Unauthorised Code Access,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ENISA Methodology for Sectoral Cybersecurity Assessments,https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnauthorisedCodeDisclosure,Unauthorised Code Disclosure,Something that acts as or causes Unauthorised Code Disclosure,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ENISA Methodology for Sectoral Cybersecurity Assessments,https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnauthorisedCodeModification,Unauthorised Code Modification,Something that acts as or causes Unauthorised Code Modification,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ENISA Methodology for Sectoral Cybersecurity Assessments,https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnauthorisedDataAccess,Unauthorised Data Access,Something that acts as or causes Unauthorised Data Access,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnauthorisedDataDisclosure,Unauthorised Data Disclosure,Something that acts as or causes Unauthorised Data Disclosure,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnauthorisedDataModification,Unauthorised Data Modification,Something that acts as or causes Unauthorised Data Modification,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnauthorisedInformationDisclosure,Unauthorised Information Disclosure,Something that acts as or causes Unauthorised Information Disclosure,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnauthorisedReidentification,Unauthorised Re-Identification,Something that acts as or causes Unauthorised Re-Identification,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,,2022-08-19,2024-08-16,accepted,Georg P. Krog,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnauthorisedResourceUse,Unauthorised Resource Use,Something that acts as or causes Unauthorised Resource Use,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnauthorisedSystemAccess,Unauthorised System Access,Something that acts as or causes Unauthorised System Access,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnauthorisedSystemModification,Unauthorised System Modification,Something that acts as or causes Unauthorised System Modification,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ENISA Methodology for Sectoral Cybersecurity Assessments,https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnwantedCodeDeletion,Unwanted Code Deletion,Something that acts as or causes Unwanted Code Deletion,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ENISA Methodology for Sectoral Cybersecurity Assessments,https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnwantedDataDeletion,Unwanted Data Deletion,Something that acts as or causes Unwanted Data Deletion,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnwantedDisclosureData,Unwanted Disclosure of Data,Something that acts as or causes Unwanted Disclosure of Data,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -Spoofing,Spoofing,Something that acts as or causes Spoofing,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -Sabotage,Sabotage,Something that acts as or causes Sabotage,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -Blackmail,Blackmail,Something that acts as or causes Blackmail,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -Coercion,Coercion,Something that acts as or causes Coercion,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ENISA Threat Taxonomy 2016,https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -Extorsion,Extorsion,Something that acts as or causes Extorsion,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ENISA Threat Taxonomy 2016,https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -Fraud,Fraud,Something that acts as or causes Fraud,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -Scam,Scam,Something that acts as or causes Scam,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -PhishingScam,Phishing Scam,Something that acts as or causes Phishing Scam,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ENISA Threat Landscape for Ransomware Attacks 2022,https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -InterceptCommunications,Intercept Communications,Something that acts as or causes Interception of Communications,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,"This concept was called ""InterceptionCommunications"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,modified,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -OperationalSecurityRisk,Operational Security Risk,Risks and issues that arise during operational processes,,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -SecurityBreach,Security Breach,Something that acts as or causes Security Breach,risk:OperationalSecurityRisk,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -DataBreach,Data Breach,Something that acts as or causes Data Breach,risk:SecurityBreach,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -ConfidentialityBreach,Confidentiality Breach,Something that acts as or causes Confidentiality Breach,risk:DataBreach,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -IntegrityBreach,,,risk:DataBreach,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -AvailabilityBreach,,,risk:DataBreach,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -DataCorruption,Data Corruption,Something that acts as or causes Corruption of Data,risk:OperationalSecurityRisk,dpv:RiskConcept,,,,"This concept was called ""Corruption Data"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,modified,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -AuthorisationFailure,Authorisation Failure,Something that acts as or causes Authorisation Failure,risk:OperationalSecurityRisk,dpv:RiskConcept,,,,,"(ENISa Trust Services Security Incidents 2021,https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -Reidentification,Re-identification,Something that acts as or causes Re-identification,risk:OperationalSecurityRisk,dpv:RiskConcept,,,,Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification,,2022-08-19,2024-08-16,accepted,Harshvardhan J. Pandit,,,,,,,,,,,,,,,,,, -IdentityFraud,Identity Fraud,Something that acts as or causes Identity Fraud,risk:OperationalSecurityRisk,dpv:RiskConcept,,,,,"(ENISA Threat Taxonomy 2016,https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -IdentityTheft,Identity Theft,Something that acts as or causes Identity Theft,risk:OperationalSecurityRisk,dpv:RiskConcept,,,,,"(ENISA Threat Taxonomy 2016,https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -Spoofing,Spoofing,Something that acts as or causes Spoofing,risk:OperationalSecurityRisk,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -CompromiseAccount,Compromise Account,Something that acts as or causes a compromised account that is then used by the compromiser,risk:OperationalSecurityRisk,dpv:RiskConcept,,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -CompromiseAccountCredentials,Compromise Account Credentials,Something that acts as or causes Account Credentials to be compromised,risk:OperationalSecurityRisk,dpv:RiskConcept,,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -EquipmentFailure,Equipment Failure,Something that acts as or causes Equipment Failure,risk:OperationalSecurityRisk,dpv:RiskConcept,,,,Here equipment refers to physical equipment,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -EquipmentMalfunction,Equipment Malfunction,Something that acts as or causes Equipment Malfunction,risk:OperationalSecurityRisk,dpv:RiskConcept,,,,Here equipment refers to physical equipment,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -SystemFailure,System Failure,Something that acts as or causes System Failure,risk:OperationalSecurityRisk,dpv:RiskConcept,,,,Here system refers to both hardware and software systems,"(ENISA Threat Landscape for Ransomware Attacks 2022,https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -SystemMalfunction,System Malfunction,Something that acts as or causes System Malfunction,risk:OperationalSecurityRisk,dpv:RiskConcept,,,,Here system refers to both hardware and software systems,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -ComponentFailure,Component Failure,Something that acts as or causes Component Failure,risk:OperationalSecurityRisk,dpv:RiskConcept,,,,Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of,,,,accepted,,,,,,,,,,,,,,,,,,, -ComponentMalfunction,Component Malfunction,Something that acts as or causes Component Malfunction,risk:OperationalSecurityRisk,dpv:RiskConcept,,,,Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of,,,,accepted,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -LegalRisk,Legal Risk,Risks and issues that have their basis in legal requirements and enforcement,,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -IllegalDataProcessing,Illegal Data Processing,Something that acts as or causes Illegal Processing of Data,risk:LegalRisk,dpv:RiskConcept,,,,"This concept was called ""IllegalProcessingData"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -PublicOrderBreach,Public Order Breach,Something that acts as or causes Public Order Breach,risk:LegalRisk,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -ViolatingContractualObligation,Violation of Contractual Obligation,Something that acts as or causes Violation of Contractual Obligations,risk:LegalRisk,dpv:RiskConcept,,,,"This concept was called ""ViolationContractualObligations"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,modified,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -ViolatingLegalObligation,Violation of Legal Obligations,Something that acts as or causes Violation of Legal Obligations,risk:LegalRisk,dpv:RiskConcept,,,,"This concept was called ""ViolationRegulatoryObligations"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,modified,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -ViolatingStatutoryObligations,Violation of Statutory Obligations,Something that acts as or causes Violation of Statutory Obligations,risk:LegalRisk,dpv:RiskConcept,,,,"This concept was called ""ViolationStatutoryObligations"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,modified,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -CopyrightViolation,Copyright Violation,Something that acts as or causes Copyright Violation,risk:LegalRisk,dpv:RiskConcept,,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -ViolatingCodeOfConduct,Violating Code of Conduct,Something that acts as or causes Violation of Code of Conduct,risk:LegalRisk,dpv:RiskConcept,,,,"This concept was called ""ViolationCodeConduct"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,modified,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -ViolatingEthicsCode,Violating Ethics Code,Something that acts as or causes Violation of Ethics Code,risk:LegalRisk,dpv:RiskConcept,,,,"This concept was called ""ViolationEthicalCode"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,modified,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -ViolatingPolicy,Violating Policy,Something that acts as or causes violation of policy which can be either internal or external policy,risk:LegalRisk,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -Detriment,Detriment,Something that acts as or causes Detriment,risk:LegalRisk,dpv:RiskConcept,,,,,,2022-03-23,2024-08-16,accepted,"Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves",https://www.w3.org/2022/03/23-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -Damage,Damage,Something that acts as or causes Damage,risk:LegalRisk,dpv:RiskConcept,,,,,,2022-03-30,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/03/30-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -MaterialDamage,Material Damage,Something that acts as or causes Material Damage,risk:LegalRisk,dpv:RiskConcept,,,,The criteria for what is considered material damage is based in jurisdictional laws and norms,,2022-03-30,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/03/30-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -NonMaterialDamage,Non-Material Damage,Something that acts as or causes Non-Material Damage,risk:LegalRisk,dpv:RiskConcept,,,,The criteria for what is considered material damage is based in jurisdictional laws and norms,,2022-03-30,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/03/30-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +ExternalSecurityThreat,External Security Threat,Concepts associated with security threats that are likely to originate externally,,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +SecurityAttack,Security Attack,Something that acts as or causes an attack on security with the aim of undermining it,risk:ExternalSecurityThreat,dpv:RiskConcept,,"C,I,A",,,,,,,accepted,,,,,,,,,,,,,,,,,,, +Cryptojacking,Cryptojacking,Something that acts as or causes Cryptojacking,risk:ExternalSecurityThreat,dpv:RiskConcept,,A,,,,"(ENISA Threat Landscape 2021,https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +DenialServiceAttack,Denial of Service Attack (DoS),Something that acts as or causes Denial of Service Attack (DoS),risk:ExternalSecurityThreat,dpv:RiskConcept,,A,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +DistributedDenialServiceAttack,Distributed Denial of Service Attack (DDoS),Something that acts as or causes Distributed Denial of Service Attack (DDoS),risk:ExternalSecurityThreat,dpv:RiskConcept,,A,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +BruteForceAuthorisations,Brute Force Authorisations,Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques,risk:ExternalSecurityThreat,dpv:RiskConcept,,"C,I",,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +MaliciousCodeAttack,Malicious Code Attack,Something that acts as or causes Malicious Code Attack,risk:ExternalSecurityThreat,dpv:RiskConcept,,"C,I,A",,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +MalwareAttack,Malware Attack,Something that acts as or causes Malware Attack,risk:ExternalSecurityThreat,dpv:RiskConcept,,"C,I,A",,,,"(ENISA Methodology for Sectoral Cybersecurity Assessments,https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +SystemIntrusion,System Intrusion,Something that acts as or causes System Intrusion,risk:ExternalSecurityThreat,dpv:RiskConcept,,"C,I,A",,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnauthorisedActivity,Unauthorised Activity,Something that acts as or causes Unauthorised Activity,risk:ExternalSecurityThreat,dpv:RiskConcept,,"C,I,A",,,,,,,accepted,,,,,,,,,,,,,,,,,,, +UnauthorisedAccesstoPremises,Unauthorised Access to Premises,Something that acts as or causes Unauthorised Access to Premises,risk:ExternalSecurityThreat,dpv:RiskConcept,,"C,I,A",,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnauthorisedCodeAccess,Unauthorised Code Access,Something that acts as or causes Unauthorised Code Access,risk:ExternalSecurityThreat,dpv:RiskConcept,,"C,I",,,,"(ENISA Methodology for Sectoral Cybersecurity Assessments,https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnauthorisedCodeDisclosure,Unauthorised Code Disclosure,Something that acts as or causes Unauthorised Code Disclosure,risk:ExternalSecurityThreat,dpv:RiskConcept,,C,,,,"(ENISA Methodology for Sectoral Cybersecurity Assessments,https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnauthorisedCodeModification,Unauthorised Code Modification,Something that acts as or causes Unauthorised Code Modification,risk:ExternalSecurityThreat,dpv:RiskConcept,,I,,,,"(ENISA Methodology for Sectoral Cybersecurity Assessments,https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnauthorisedDataAccess,Unauthorised Data Access,Something that acts as or causes Unauthorised Data Access,risk:ExternalSecurityThreat,dpv:RiskConcept,,C,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnauthorisedDataDisclosure,Unauthorised Data Disclosure,Something that acts as or causes Unauthorised Data Disclosure,risk:ExternalSecurityThreat,dpv:RiskConcept,,C,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnauthorisedDataModification,Unauthorised Data Modification,Something that acts as or causes Unauthorised Data Modification,risk:ExternalSecurityThreat,dpv:RiskConcept,,I,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnauthorisedInformationDisclosure,Unauthorised Information Disclosure,Something that acts as or causes Unauthorised Information Disclosure,risk:ExternalSecurityThreat,dpv:RiskConcept,,C,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnauthorisedReidentification,Unauthorised Re-Identification,Something that acts as or causes Unauthorised Re-Identification,risk:ExternalSecurityThreat,dpv:RiskConcept,,C,,,,,2022-08-19,2024-08-16,accepted,Georg P. Krog,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnauthorisedResourceUse,Unauthorised Resource Use,Something that acts as or causes Unauthorised Resource Use,risk:ExternalSecurityThreat,dpv:RiskConcept,,A,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnauthorisedSystemAccess,Unauthorised System Access,Something that acts as or causes Unauthorised System Access,risk:ExternalSecurityThreat,dpv:RiskConcept,,"C,I",,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnauthorisedSystemModification,Unauthorised System Modification,Something that acts as or causes Unauthorised System Modification,risk:ExternalSecurityThreat,dpv:RiskConcept,,I,,,,"(ENISA Methodology for Sectoral Cybersecurity Assessments,https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnwantedCodeDeletion,Unwanted Code Deletion,Something that acts as or causes Unwanted Code Deletion,risk:ExternalSecurityThreat,dpv:RiskConcept,,"I,A",,,,"(ENISA Methodology for Sectoral Cybersecurity Assessments,https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnwantedDataDeletion,Unwanted Data Deletion,Something that acts as or causes Unwanted Data Deletion,risk:ExternalSecurityThreat,dpv:RiskConcept,,"I,A",,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnwantedDisclosureData,Unwanted Disclosure of Data,Something that acts as or causes Unwanted Disclosure of Data,risk:ExternalSecurityThreat,dpv:RiskConcept,,C,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +Spoofing,Spoofing,Something that acts as or causes Spoofing,risk:ExternalSecurityThreat,dpv:RiskConcept,,"C,I",,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +Sabotage,Sabotage,Something that acts as or causes Sabotage,risk:ExternalSecurityThreat,dpv:RiskConcept,,"I,A",,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +Blackmail,Blackmail,Something that acts as or causes Blackmail,risk:ExternalSecurityThreat,dpv:RiskConcept,,C,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +Coercion,Coercion,Something that acts as or causes Coercion,risk:ExternalSecurityThreat,dpv:RiskConcept,,C,,,,"(ENISA Threat Taxonomy 2016,https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +Extorsion,Extorsion,Something that acts as or causes Extorsion,risk:ExternalSecurityThreat,dpv:RiskConcept,,C,,,,"(ENISA Threat Taxonomy 2016,https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +Fraud,Fraud,Something that acts as or causes Fraud,risk:ExternalSecurityThreat,dpv:RiskConcept,,C,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +Scam,Scam,Something that acts as or causes Scam,risk:ExternalSecurityThreat,dpv:RiskConcept,,C,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +PhishingScam,Phishing Scam,Something that acts as or causes Phishing Scam,risk:ExternalSecurityThreat,dpv:RiskConcept,,C,,,,"(ENISA Threat Landscape for Ransomware Attacks 2022,https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +InterceptCommunications,Intercept Communications,Something that acts as or causes Interception of Communications,risk:ExternalSecurityThreat,dpv:RiskConcept,,C,,,"This concept was called ""InterceptionCommunications"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,modified,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +OperationalSecurityRisk,Operational Security Risk,Risks and issues that arise during operational processes,,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +SecurityBreach,Security Breach,Something that acts as or causes Security Breach,risk:OperationalSecurityRisk,dpv:RiskConcept,,"C,I,A",,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +DataBreach,Data Breach,Something that acts as or causes Data Breach,risk:SecurityBreach,dpv:RiskConcept,,"C,I,A",,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +ConfidentialityBreach,Confidentiality Breach,Something that acts as or causes Confidentiality Breach,risk:DataBreach,dpv:RiskConcept,,C,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +IntegrityBreach,,,risk:DataBreach,dpv:RiskConcept,,I,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +AvailabilityBreach,,,risk:DataBreach,dpv:RiskConcept,,A,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +DataCorruption,Data Corruption,Something that acts as or causes Corruption of Data,risk:OperationalSecurityRisk,dpv:RiskConcept,,I,,,"This concept was called ""Corruption Data"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,modified,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +AuthorisationFailure,Authorisation Failure,Something that acts as or causes Authorisation Failure,risk:OperationalSecurityRisk,dpv:RiskConcept,,"C,I",,,,"(ENISa Trust Services Security Incidents 2021,https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +Reidentification,Re-identification,Something that acts as or causes Re-identification,risk:OperationalSecurityRisk,dpv:RiskConcept,,C,,,Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification,,2022-08-19,2024-08-16,accepted,Harshvardhan J. Pandit,,,,,,,,,,,,,,,,,, +IdentityFraud,Identity Fraud,Something that acts as or causes Identity Fraud,risk:OperationalSecurityRisk,dpv:RiskConcept,,C,,,,"(ENISA Threat Taxonomy 2016,https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +IdentityTheft,Identity Theft,Something that acts as or causes Identity Theft,risk:OperationalSecurityRisk,dpv:RiskConcept,,C,,,,"(ENISA Threat Taxonomy 2016,https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +Spoofing,Spoofing,Something that acts as or causes Spoofing,risk:OperationalSecurityRisk,dpv:RiskConcept,,"C,I",,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +CompromiseAccount,Compromise Account,Something that acts as or causes a compromised account that is then used by the compromiser,risk:OperationalSecurityRisk,dpv:RiskConcept,,"C,I,A",,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +CompromiseAccountCredentials,Compromise Account Credentials,Something that acts as or causes Account Credentials to be compromised,risk:OperationalSecurityRisk,dpv:RiskConcept,,C,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +EquipmentFailure,Equipment Failure,Something that acts as or causes Equipment Failure,risk:OperationalSecurityRisk,dpv:RiskConcept,,A,,,Here equipment refers to physical equipment,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +EquipmentMalfunction,Equipment Malfunction,Something that acts as or causes Equipment Malfunction,risk:OperationalSecurityRisk,dpv:RiskConcept,,A,,,Here equipment refers to physical equipment,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +SystemFailure,System Failure,Something that acts as or causes System Failure,risk:OperationalSecurityRisk,dpv:RiskConcept,,A,,,Here system refers to both hardware and software systems,"(ENISA Threat Landscape for Ransomware Attacks 2022,https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +SystemMalfunction,System Malfunction,Something that acts as or causes System Malfunction,risk:OperationalSecurityRisk,dpv:RiskConcept,,A,,,Here system refers to both hardware and software systems,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +ComponentFailure,Component Failure,Something that acts as or causes Component Failure,risk:OperationalSecurityRisk,dpv:RiskConcept,,A,,,Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of,,,,accepted,,,,,,,,,,,,,,,,,,, +ComponentMalfunction,Component Malfunction,Something that acts as or causes Component Malfunction,risk:OperationalSecurityRisk,dpv:RiskConcept,,A,,,Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of,,,,accepted,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +LegalRisk,Legal Risk,Risks and issues that have their basis in legal requirements and enforcement,,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +IllegalDataProcessing,Illegal Data Processing,Something that acts as or causes Illegal Processing of Data,risk:LegalRisk,dpv:RiskConcept,,,,,"This concept was called ""IllegalProcessingData"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +PublicOrderBreach,Public Order Breach,Something that acts as or causes Public Order Breach,risk:LegalRisk,dpv:RiskConcept,,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +ViolatingContractualObligation,Violation of Contractual Obligation,Something that acts as or causes Violation of Contractual Obligations,risk:LegalRisk,dpv:RiskConcept,,,,,"This concept was called ""ViolationContractualObligations"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,modified,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +ViolatingLegalObligation,Violation of Legal Obligations,Something that acts as or causes Violation of Legal Obligations,risk:LegalRisk,dpv:RiskConcept,,,,,"This concept was called ""ViolationRegulatoryObligations"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,modified,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +ViolatingStatutoryObligations,Violation of Statutory Obligations,Something that acts as or causes Violation of Statutory Obligations,risk:LegalRisk,dpv:RiskConcept,,,,,"This concept was called ""ViolationStatutoryObligations"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,modified,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +CopyrightViolation,Copyright Violation,Something that acts as or causes Copyright Violation,risk:LegalRisk,dpv:RiskConcept,,,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +ViolatingCodeOfConduct,Violating Code of Conduct,Something that acts as or causes Violation of Code of Conduct,risk:LegalRisk,dpv:RiskConcept,,,,,"This concept was called ""ViolationCodeConduct"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,modified,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +ViolatingEthicsCode,Violating Ethics Code,Something that acts as or causes Violation of Ethics Code,risk:LegalRisk,dpv:RiskConcept,,,,,"This concept was called ""ViolationEthicalCode"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,modified,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +ViolatingPolicy,Violating Policy,Something that acts as or causes violation of policy which can be either internal or external policy,risk:LegalRisk,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +Detriment,Detriment,Something that acts as or causes Detriment,risk:LegalRisk,dpv:RiskConcept,,,,,,,2022-03-23,2024-08-16,accepted,"Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves",https://www.w3.org/2022/03/23-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +Damage,Damage,Something that acts as or causes Damage,risk:LegalRisk,dpv:RiskConcept,,,,,,,2022-03-30,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/03/30-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +MaterialDamage,Material Damage,Something that acts as or causes Material Damage,risk:LegalRisk,dpv:RiskConcept,,,,,The criteria for what is considered material damage is based in jurisdictional laws and norms,,2022-03-30,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/03/30-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +NonMaterialDamage,Non-Material Damage,Something that acts as or causes Non-Material Damage,risk:LegalRisk,dpv:RiskConcept,,,,,The criteria for what is considered material damage is based in jurisdictional laws and norms,,2022-03-30,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/03/30-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -ReputationalRisk,Reputational Risk,Risks and issues that affect the reputation of the organisation,,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -LoseCredibility,Lose of Credibility,Something that acts as or causes Loss of Credibility,risk:ReputationalRisk,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -LoseCustomerConfidence,Lose of Customer Confidence,Something that acts as or causes Loss of Customer Confidence,risk:ReputationalRisk,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -LoseGoodwill,Lose of Goodwill,Something that acts as or causes Loss of Goodwill,risk:ReputationalRisk,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -LoseNegotiatingCapacity,Lose of Negotiating Capacity,Something that acts as or causes Loss of Negotiating Capacity,risk:ReputationalRisk,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -LoseOpportunity,Lose of Opportunity,Something that acts as or causes Loss of Opportunity,risk:ReputationalRisk,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -LoseReputation,Lose of Reputation,Something that acts as or causes Loss of Reputation,risk:ReputationalRisk,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -LoseTrust,Lose of Trust,Something that acts as or causes Loss of Trust,risk:ReputationalRisk,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -SocietalRisk,Societal Risk,Risks and issues that affect or have the potential to affect society at large or specific groups in society,,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -Discrimination,Discrimination,Something that acts as or causes Discrimination,risk:SocietalRisk,dpv:RiskConcept,,,,,,2022-08-19,2024-08-16,accepted,Georg P. Krog,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -ExposureToHarmfulSpeech,Exposure to Harmful Speech,Something that acts as or causes Harmful Speech,risk:SocietalRisk,dpv:RiskConcept,,,,"This concept was called ""HarmfulSpeech"" in DPV 2.0","(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -PersonalSafetyEndangerment,Personal Safety Endangerment,Something that acts as or causes Personal Safety Endangerment,risk:SocietalRisk,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -SocialDisadvantage,Social Disadvantage,Something that acts as or causes Social Disadvantage,risk:SocietalRisk,dpv:RiskConcept,,,,,,2022-08-19,2024-08-16,accepted,Georg P. Krog,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -SocietalHealthSafety,Societal Health & Safety ,,risk:SocietalRisk,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -Terrorism,Terrorism,Something that acts as or causes Terrorism,risk:SocietalRisk,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -RightsImpact,Impact to Rights,Something that acts as or causes Impact to Rights,"risk:SocietalRisk,dpv:Impact",dpv:RiskConcept,,,,"This concept was called ""ImpactToRights"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -RightsViolation,Violation of Rights,Something that acts as or causes Violation of Rights,risk:SocietalRisk,dpv:RiskConcept,,,,"This concept was called ""ViolationOfRights"" in DPV 2.0",,2022-08-18,2024-08-16,accepted,"Georg P. Krog, Harshvardhan J. Pandit",https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -RightsExercisePrevention,Prevent Exercising of Rights,Something that acts as or causes Prevent Exercising of Rights,risk:SocietalRisk,dpv:RiskConcept,,,,"This concept was called ""PreventExercisingOfRights"" in DPV 2.0",,2022-08-18,2024-08-16,accepted,"Georg P. Krog, Harshvardhan J. Pandit",https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -RightsLimitation,Limitation of Rights,Something that acts as or causes Limitation of Rights,risk:SocietalRisk,dpv:RiskConcept,,,,"This concept was called ""LimitationOfRights"" in DPV 2.0",,2022-08-18,2024-08-16,accepted,"Georg P. Krog, Harshvardhan J. Pandit",https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -IndividualRisk,Individual Risk,Risks and issues that affect or have the potential to affect specific individuals,,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -Harm,Harm,Something that acts as or causes Harm to humans,risk:IndividualRisk,dpv:RiskConcept,,,,This concept refers to the general abstract notion of harm,,2022-08-13,2024-08-16,accepted,Harshvardhan J. Pandit,,,,,,,,,,,,,,,,,, -PhysicalHarm,Physical Harm,,risk:IndividualRisk,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -Injury,Injury,Something that acts as or causes Injury,risk:IndividualRisk,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -ViolenceAgainstChildren,Violence against children,Something that acts as or causes Child Violence,risk:IndividualRisk,dpv:RiskConcept,,,,"This concept was called ""ChildViolence"" in DPV 2.0","(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -PhysicalAssault,Physical Assault,Something that acts as or causes Physical Assault,risk:IndividualRisk,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -PsychologicalHarm,Psychological Harm,Something that acts as or causes Psychological Harm,risk:IndividualRisk,dpv:RiskConcept,,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -SexualViolence,Sexual Violence,Something that acts as or causes Sexual Violence,risk:IndividualRisk,dpv:RiskConcept,,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -IndividualHealthSafety,Individual Health & Safety,,risk:IndividualRisk,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -Privacy,Privacy,,risk:IndividualRisk,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -EnvironmentalRisk,Environmental Risk,Risks and issues that have their origin in environment or can affect the environment at large,,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -FinancialImpact,Financial Impact,Things that cause or have the potential to impact financial resources,,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -Benefit,Benefit,Something that acts as or causes benefits,risk:FinancialImpact,dpv:RiskConcept,,,,,,2022-03-23,2024-08-16,accepted,"Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres",https://www.w3.org/2022/03/23-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -Compensation,Compensation,Something that acts as or provides compensation - which can be monetary and financial or in other forms,risk:FinancialImpact,dpv:RiskConcept,,,,,,2024-04-14,2024-08-16,accepted,"Georg P. Krog, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, -Reward,Reward,Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee,risk:FinancialImpact,dpv:RiskConcept,,,,,,2024-04-14,2024-08-16,accepted,"Georg P. Krog, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, -Payment,Payment,Something that acts as or provides payment e.g. to access a service or purchase resources,risk:FinancialImpact,dpv:RiskConcept,,,,,,2024-04-14,2024-08-16,accepted,"Georg P. Krog, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, -Fee,Fee,Something that acts as or provides fees e.g. for using a service,risk:FinancialImpact,dpv:RiskConcept,,,,,DGA 2.10,2024-04-14,2024-08-16,modified,"Georg P. Krog, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, -Renumeration,Remuneration,Something that acts as or provides renumeration which is in monetary or financial form,risk:FinancialImpact,dpv:RiskConcept,,,,,,2024-04-14,2024-08-16,accepted,"Georg P. Krog, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, -FinancialLoss,Financial Loss,Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity,risk:FinancialImpact,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -JudicialPenalty,Judicial Penalty,Something that involves or causes judicial penalties to be paid,risk:FinancialImpact,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -JudicialCosts,Judicial Costs,Something that involves or causes judicial costs to be paid,risk:FinancialImpact,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +ReputationalRisk,Reputational Risk,Risks and issues that affect the reputation of the organisation,,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +LoseCredibility,Lose of Credibility,Something that acts as or causes Loss of Credibility,risk:ReputationalRisk,dpv:RiskConcept,,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +LoseCustomerConfidence,Lose of Customer Confidence,Something that acts as or causes Loss of Customer Confidence,risk:ReputationalRisk,dpv:RiskConcept,,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +LoseGoodwill,Lose of Goodwill,Something that acts as or causes Loss of Goodwill,risk:ReputationalRisk,dpv:RiskConcept,,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +LoseNegotiatingCapacity,Lose of Negotiating Capacity,Something that acts as or causes Loss of Negotiating Capacity,risk:ReputationalRisk,dpv:RiskConcept,,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +LoseOpportunity,Lose of Opportunity,Something that acts as or causes Loss of Opportunity,risk:ReputationalRisk,dpv:RiskConcept,,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +LoseReputation,Lose of Reputation,Something that acts as or causes Loss of Reputation,risk:ReputationalRisk,dpv:RiskConcept,,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +LoseTrust,Lose of Trust,Something that acts as or causes Loss of Trust,risk:ReputationalRisk,dpv:RiskConcept,,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +SocietalRisk,Societal Risk,Risks and issues that affect or have the potential to affect society at large or specific groups in society,,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +Discrimination,Discrimination,Something that acts as or causes Discrimination,risk:SocietalRisk,dpv:RiskConcept,,,,,,,2022-08-19,2024-08-16,accepted,Georg P. Krog,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +ExposureToHarmfulSpeech,Exposure to Harmful Speech,Something that acts as or causes Harmful Speech,risk:SocietalRisk,dpv:RiskConcept,,,,,"This concept was called ""HarmfulSpeech"" in DPV 2.0","(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +PersonalSafetyEndangerment,Personal Safety Endangerment,Something that acts as or causes Personal Safety Endangerment,risk:SocietalRisk,dpv:RiskConcept,,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +SocialDisadvantage,Social Disadvantage,Something that acts as or causes Social Disadvantage,risk:SocietalRisk,dpv:RiskConcept,,,,,,,2022-08-19,2024-08-16,accepted,Georg P. Krog,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +SocietalHealthSafety,Societal Health & Safety ,,risk:SocietalRisk,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +Terrorism,Terrorism,Something that acts as or causes Terrorism,risk:SocietalRisk,dpv:RiskConcept,,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +RightsImpact,Impact to Rights,Something that acts as or causes Impact to Rights,"risk:SocietalRisk,dpv:Impact",dpv:RiskConcept,,,,,"This concept was called ""ImpactToRights"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +RightsViolation,Violation of Rights,Something that acts as or causes Violation of Rights,risk:SocietalRisk,dpv:RiskConcept,,,,,"This concept was called ""ViolationOfRights"" in DPV 2.0",,2022-08-18,2024-08-16,accepted,"Georg P. Krog, Harshvardhan J. Pandit",https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +RightsExercisePrevention,Prevent Exercising of Rights,Something that acts as or causes Prevent Exercising of Rights,risk:SocietalRisk,dpv:RiskConcept,,,,,"This concept was called ""PreventExercisingOfRights"" in DPV 2.0",,2022-08-18,2024-08-16,accepted,"Georg P. Krog, Harshvardhan J. Pandit",https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +RightsLimitation,Limitation of Rights,Something that acts as or causes Limitation of Rights,risk:SocietalRisk,dpv:RiskConcept,,,,,"This concept was called ""LimitationOfRights"" in DPV 2.0",,2022-08-18,2024-08-16,accepted,"Georg P. Krog, Harshvardhan J. Pandit",https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +IndividualRisk,Individual Risk,Risks and issues that affect or have the potential to affect specific individuals,,,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +Harm,Harm,Something that acts as or causes Harm to humans,risk:IndividualRisk,dpv:RiskConcept,,,,,This concept refers to the general abstract notion of harm,,2022-08-13,2024-08-16,accepted,Harshvardhan J. Pandit,,,,,,,,,,,,,,,,,, +PhysicalHarm,Physical Harm,,risk:IndividualRisk,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +Injury,Injury,Something that acts as or causes Injury,risk:IndividualRisk,dpv:RiskConcept,,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +ViolenceAgainstChildren,Violence against children,Something that acts as or causes Child Violence,risk:IndividualRisk,dpv:RiskConcept,,,,,"This concept was called ""ChildViolence"" in DPV 2.0","(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +PhysicalAssault,Physical Assault,Something that acts as or causes Physical Assault,risk:IndividualRisk,dpv:RiskConcept,,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +PsychologicalHarm,Psychological Harm,Something that acts as or causes Psychological Harm,risk:IndividualRisk,dpv:RiskConcept,,,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +SexualViolence,Sexual Violence,Something that acts as or causes Sexual Violence,risk:IndividualRisk,dpv:RiskConcept,,,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +IndividualHealthSafety,Individual Health & Safety,,risk:IndividualRisk,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +Privacy,Privacy,,risk:IndividualRisk,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +EnvironmentalRisk,Environmental Risk,Risks and issues that have their origin in environment or can affect the environment at large,,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +FinancialImpact,Financial Impact,Things that cause or have the potential to impact financial resources,,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +Benefit,Benefit,Something that acts as or causes benefits,risk:FinancialImpact,dpv:RiskConcept,,,,,,,2022-03-23,2024-08-16,accepted,"Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres",https://www.w3.org/2022/03/23-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +Compensation,Compensation,Something that acts as or provides compensation - which can be monetary and financial or in other forms,risk:FinancialImpact,dpv:RiskConcept,,,,,,,2024-04-14,2024-08-16,accepted,"Georg P. Krog, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, +Reward,Reward,Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee,risk:FinancialImpact,dpv:RiskConcept,,,,,,,2024-04-14,2024-08-16,accepted,"Georg P. Krog, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, +Payment,Payment,Something that acts as or provides payment e.g. to access a service or purchase resources,risk:FinancialImpact,dpv:RiskConcept,,,,,,,2024-04-14,2024-08-16,accepted,"Georg P. Krog, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, +Fee,Fee,Something that acts as or provides fees e.g. for using a service,risk:FinancialImpact,dpv:RiskConcept,,,,,,DGA 2.10,2024-04-14,2024-08-16,modified,"Georg P. Krog, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, +Renumeration,Remuneration,Something that acts as or provides renumeration which is in monetary or financial form,risk:FinancialImpact,dpv:RiskConcept,,,,,,,2024-04-14,2024-08-16,accepted,"Georg P. Krog, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, +FinancialLoss,Financial Loss,Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity,risk:FinancialImpact,dpv:RiskConcept,,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +JudicialPenalty,Judicial Penalty,Something that involves or causes judicial penalties to be paid,risk:FinancialImpact,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +JudicialCosts,Judicial Costs,Something that involves or causes judicial costs to be paid,risk:FinancialImpact,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, diff --git a/code/vocab_csv/risk.xlsx b/code/vocab_csv/risk.xlsx index c408e0da4..98b8bba56 100644 Binary files a/code/vocab_csv/risk.xlsx and b/code/vocab_csv/risk.xlsx differ diff --git a/code/vocab_funcs.py b/code/vocab_funcs.py index cdc5728a0..18eb44887 100644 --- a/code/vocab_funcs.py +++ b/code/vocab_funcs.py @@ -459,4 +459,15 @@ def add_example_concepts(term, data, namespace, header): if concept not in EXAMPLES: # add to list of examples by concept EXAMPLES[concept] = [] EXAMPLES[concept].append(data['Term']) - return triples \ No newline at end of file + return triples + +def construct_risk_parent(term, data, namespace, header): + triples = [] + if 'CIA' not in data: return triples + if 'C' in data['CIA']: + triples.append((namespace[data['Term']], SKOS.broader, namespace['ConfidentialityConcept'])) + if 'I' in data['CIA']: + triples.append((namespace[data['Term']], SKOS.broader, namespace['IntegrityConcept'])) + if 'A' in data['CIA']: + triples.append((namespace[data['Term']], SKOS.broader, namespace['AvailabilityConcept'])) + return triples diff --git a/code/vocab_management.py b/code/vocab_management.py index 59a8d3a88..a66e9ffa5 100644 --- a/code/vocab_management.py +++ b/code/vocab_management.py @@ -294,7 +294,7 @@ 'taxonomy': f'{IMPORT_CSV_PATH}/RiskControls.csv', }, 'risk_consequences': { - 'taxonomy': f'{IMPORT_CSV_PATH}/RiskConsequences.csv', + 'taxonomy-risk': f'{IMPORT_CSV_PATH}/RiskConsequences.csv', }, 'incident': { 'taxonomy': f'{IMPORT_CSV_PATH}/Incident.csv', @@ -317,15 +317,15 @@ 'taxonomy': f'{IMPORT_CSV_PATH}/Justifications_Exercise.csv', }, }, - 'loc': { - 'locations': { - 'locations': f'{IMPORT_CSV_PATH}/location.csv', - 'properties': f'{IMPORT_CSV_PATH}/location_properties.csv', - }, - 'memberships': { - 'memberships': f'{IMPORT_CSV_PATH}/location_memberships.csv', - }, - }, + # 'loc': { + # 'locations': { + # 'locations': f'{IMPORT_CSV_PATH}/location.csv', + # 'properties': f'{IMPORT_CSV_PATH}/location_properties.csv', + # }, + # 'memberships': { + # 'memberships': f'{IMPORT_CSV_PATH}/location_memberships.csv', + # }, + # }, # Laws-Authorities 'legal-at': { 'at': { diff --git a/code/vocab_schemas.py b/code/vocab_schemas.py index fe0edc7f9..a3ce88e43 100644 --- a/code/vocab_schemas.py +++ b/code/vocab_schemas.py @@ -48,6 +48,9 @@ def get_schema(name): 'Contributors': vocab_funcs.construct_contributors, 'Resolution': vocab_funcs.construct_resolution, } +SCHEMA['taxonomy-risk'] = SCHEMA['taxonomy'].copy() +SCHEMA['taxonomy-risk']['ParentTerm'] = vocab_funcs.construct_risk_parent +SCHEMA['taxonomy-risk']['CIA'] = None SCHEMA['properties'] = { '_description': 'lorem ipsum',