From 0b6ff72db140c05b51a550a3107395b9c88277bc Mon Sep 17 00:00:00 2001 From: Harshvardhan Pandit Date: Mon, 19 Aug 2024 14:59:54 +0100 Subject: [PATCH] RISK: adds CIA modelling to risk concepts taxonomy - RiskConcepts under ExternalSecurityThreat and OperationalSecurityRisk have been reorganised under the Confidentiality, Integrity, Availability (CIA) InfoSec triad - see #181 for discussion --- 2.1-dev/risk/index-en.html | 945 +- 2.1-dev/risk/index.html | 945 +- .../risk/modules/risk_consequences-owl.jsonld | 3998 +++--- 2.1-dev/risk/modules/risk_consequences-owl.n3 | 206 +- .../risk/modules/risk_consequences-owl.rdf | 2542 ++-- .../risk/modules/risk_consequences-owl.ttl | 206 +- 2.1-dev/risk/modules/risk_consequences.csv | 100 +- 2.1-dev/risk/modules/risk_consequences.jsonld | 4344 +++---- 2.1-dev/risk/modules/risk_consequences.n3 | 208 +- 2.1-dev/risk/modules/risk_consequences.rdf | 2032 ++-- 2.1-dev/risk/modules/risk_consequences.ttl | 208 +- 2.1-dev/risk/risk-en.html | 945 +- 2.1-dev/risk/risk-owl.html | 481 +- 2.1-dev/risk/risk-owl.jsonld | 9308 +++++++------- 2.1-dev/risk/risk-owl.n3 | 206 +- 2.1-dev/risk/risk-owl.rdf | 5794 ++++----- 2.1-dev/risk/risk-owl.ttl | 206 +- 2.1-dev/risk/risk.csv | 116 +- 2.1-dev/risk/risk.html | 945 +- 2.1-dev/risk/risk.jsonld | 10066 ++++++++-------- 2.1-dev/risk/risk.n3 | 208 +- 2.1-dev/risk/risk.rdf | 5288 ++++---- 2.1-dev/risk/risk.ttl | 208 +- code/jinja2_resources/template_risk.jinja2 | 106 +- code/vocab_csv/RiskConsequences.csv | 1978 ++- code/vocab_csv/risk.xlsx | Bin 390233 -> 466135 bytes code/vocab_funcs.py | 13 +- code/vocab_management.py | 20 +- code/vocab_schemas.py | 3 + 29 files changed, 27107 insertions(+), 24518 deletions(-) diff --git a/2.1-dev/risk/index-en.html b/2.1-dev/risk/index-en.html index c8b42bf5f..4efbea699 100644 --- a/2.1-dev/risk/index-en.html +++ b/2.1-dev/risk/index-en.html @@ -1271,92 +1271,77 @@

Consequences and Impacts

dpv:hasImpact risk:RightsImpact . -

The risk concepts taxonomy is broadly divided into the following categories:

+

The concepts taxonomy is broadly divided into the following categories:

-
-

InternalSecurityThreat

-
    +
    +

    CIA Model

    +

    Confidentiality

    +
    • - risk:VulnerabilityCreated: Something that acts as or causes Vulnerability Created - go to full definition + risk:AuthorisationFailure: Something that acts as or causes Authorisation Failure + go to full definition
    • -
    -
    -
    -

    UserRisks

    -
    -
    -
    -

    ExternalSecurityThreat

    -
    • - risk:Blackmail: Something that acts as or causes Blackmail - go to full definition + risk:ConfidentialityBreach: Something that acts as or causes Confidentiality Breach + go to full definition
    • - risk:BruteForceAuthorisations: Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques - go to full definition - -
    • + risk:DataBreach: Something that acts as or causes Data Breach + go to full definition +
    • risk:Extorsion: Something that acts as or causes Extorsion @@ -1367,6 +1352,16 @@

      ExternalSecurityThreat

      risk:Fraud: Something that acts as or causes Fraud go to full definition +
    • +
    • + risk:IdentityFraud: Something that acts as or causes Identity Fraud + go to full definition + +
    • +
    • + risk:IdentityTheft: Something that acts as or causes Identity Theft + go to full definition +
    • risk:InterceptCommunications: Something that acts as or causes Interception of Communications @@ -1389,8 +1384,8 @@

      ExternalSecurityThreat

    • - risk:Sabotage: Something that acts as or causes Sabotage - go to full definition + risk:Reidentification: Something that acts as or causes Re-identification + go to full definition
    • @@ -1402,6 +1397,33 @@

      ExternalSecurityThreat

      risk:SecurityAttack: Something that acts as or causes an attack on security with the aim of undermining it go to full definition +
    • +
    • + risk:SecurityBreach: Something that acts as or causes Security Breach + go to full definition +
    • risk:Spoofing: Something that acts as or causes Spoofing @@ -1432,11 +1454,6 @@

      ExternalSecurityThreat

      risk:UnauthorisedCodeDisclosure: Something that acts as or causes Unauthorised Code Disclosure go to full definition -
    • -
    • - risk:UnauthorisedCodeModification: Something that acts as or causes Unauthorised Code Modification - go to full definition -
    • risk:UnauthorisedDataAccess: Something that acts as or causes Unauthorised Data Access @@ -1447,11 +1464,6 @@

      ExternalSecurityThreat

      risk:UnauthorisedDataDisclosure: Something that acts as or causes Unauthorised Data Disclosure go to full definition -
    • -
    • - risk:UnauthorisedDataModification: Something that acts as or causes Unauthorised Data Modification - go to full definition -
    • risk:UnauthorisedInformationDisclosure: Something that acts as or causes Unauthorised Information Disclosure @@ -1464,8 +1476,145 @@

      ExternalSecurityThreat

    • - risk:UnauthorisedResourceUse: Something that acts as or causes Unauthorised Resource Use - go to full definition + risk:UnauthorisedSystemAccess: Something that acts as or causes Unauthorised System Access + go to full definition + +
    • +
    • + risk:UnwantedDisclosureData: Something that acts as or causes Unwanted Disclosure of Data + go to full definition + +
    • +
    + +

    Integrity

    +
    -
    -
    -

    OperationalSecurityRisk

    -
      + +

      Availability

      +
      • - risk:AuthorisationFailure: Something that acts as or causes Authorisation Failure - go to full definition + risk:AvailabilityBreach: None + go to full definition
      • @@ -1519,13 +1662,39 @@

        OperationalSecurityRisk

      • - risk:CompromiseAccountCredentials: Something that acts as or causes Account Credentials to be compromised - go to full definition + risk:Cryptojacking: Something that acts as or causes Cryptojacking + go to full definition
      • - risk:DataCorruption: Something that acts as or causes Corruption of Data - go to full definition + risk:DataBreach: Something that acts as or causes Data Breach + go to full definition + +
      • +
      • + risk:DenialServiceAttack: Something that acts as or causes Denial of Service Attack (DoS) + go to full definition + +
      • +
      • + risk:DistributedDenialServiceAttack: Something that acts as or causes Distributed Denial of Service Attack (DDoS) + go to full definition
      • @@ -1539,18 +1708,23 @@

        OperationalSecurityRisk

      • - risk:IdentityFraud: Something that acts as or causes Identity Fraud - go to full definition + risk:MaliciousCodeAttack: Something that acts as or causes Malicious Code Attack + go to full definition
      • - risk:IdentityTheft: Something that acts as or causes Identity Theft - go to full definition + risk:MalwareAttack: Something that acts as or causes Malware Attack + go to full definition
      • - risk:Reidentification: Something that acts as or causes Re-identification - go to full definition + risk:Sabotage: Something that acts as or causes Sabotage + go to full definition + +
      • +
      • + risk:SecurityAttack: Something that acts as or causes an attack on security with the aim of undermining it + go to full definition
      • @@ -1581,13 +1755,13 @@

        OperationalSecurityRisk

    • - risk:Spoofing: Something that acts as or causes Spoofing - go to full definition + risk:SystemFailure: Something that acts as or causes System Failure + go to full definition
    • - risk:SystemFailure: Something that acts as or causes System Failure - go to full definition + risk:SystemIntrusion: Something that acts as or causes System Intrusion + go to full definition
    • @@ -1595,11 +1769,68 @@

      OperationalSecurityRisk

      go to full definition
    • +
    • + risk:UnauthorisedAccesstoPremises: Something that acts as or causes Unauthorised Access to Premises + go to full definition + +
    • +
    • + risk:UnauthorisedActivity: Something that acts as or causes Unauthorised Activity + go to full definition + +
    • +
    • + risk:UnauthorisedResourceUse: Something that acts as or causes Unauthorised Resource Use + go to full definition + +
    • +
    • + risk:UnwantedCodeDeletion: Something that acts as or causes Unwanted Code Deletion + go to full definition + +
    • +
    • + risk:UnwantedDataDeletion: Something that acts as or causes Unwanted Data Deletion + go to full definition + +
    -
    -
    -

    LegalRisk

    -
      +
    + +
    +

    User

    +
    +
    + +
    +

    Legal

    +
    • risk:CopyrightViolation: Something that acts as or causes Copyright Violation go to full definition @@ -1666,10 +1897,11 @@

      LegalRisk

    -
    -
    -

    ReputationalRisk

    -
      +
    + +
    +

    Reputational

    +
    • risk:LoseCredibility: Something that acts as or causes Loss of Credibility go to full definition @@ -1706,10 +1938,11 @@

      ReputationalRisk

    -
    -
    -

    SocietalRisk

    -
      +
    + +
    +

    Societal

    +
    • risk:Discrimination: Something that acts as or causes Discrimination go to full definition @@ -1761,10 +1994,11 @@

      SocietalRisk

    -
    -
    -

    IndividualRisk

    -
      +
    + +
    +

    Individual

    +
    • risk:Harm: Something that acts as or causes Harm to humans go to full definition @@ -1811,14 +2045,16 @@

      IndividualRisk

    -
    -
    -

    EnvironmentalRisk

    -
    -
    -
    -

    FinancialImpact

    -
      +
    + +
    +

    Environmental

    +
    +
    + +
    +

    Financial

    +
    • risk:Benefit: Something that acts as or causes benefits go to full definition @@ -1865,7 +2101,7 @@

      FinancialImpact

    -
    +
@@ -2128,8 +2364,6 @@

Classes

- - @@ -3007,6 +3241,12 @@

Authorisation Failure

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types + risk:IntegrityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -3088,6 +3328,33 @@

None

Broader/Parent types + risk:DataBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:IntegrityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:IntegrityConcept + + Broader/Parent types risk:DataBreachrisk:SecurityBreachrisk:OperationalSecurityRisk @@ -3392,6 +3659,9 @@

Blackmail

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -3473,8 +3743,14 @@

Brute Force Authorisations

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -3724,6 +4000,9 @@

Coercion

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -3883,6 +4162,9 @@

Component Failure

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -3955,6 +4237,9 @@

Component Malfunction

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -4027,6 +4312,15 @@

Compromise Account

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types + risk:IntegrityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -4108,6 +4402,9 @@

Compromise Account Credentials

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -4189,6 +4486,33 @@

Confidentiality Breach

Broader/Parent types + risk:DataBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:IntegrityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:IntegrityConcept + + Broader/Parent types risk:DataBreachrisk:SecurityBreachrisk:OperationalSecurityRisk @@ -4666,6 +4990,9 @@

Cryptojacking

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -4825,6 +5152,18 @@

Data Breach

Broader/Parent types + risk:SecurityBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:SecurityBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:SecurityBreach + → risk:IntegrityConcept + + Broader/Parent types risk:SecurityBreachrisk:OperationalSecurityRiskdpv:RiskConcept @@ -4910,6 +5249,9 @@

Data Corruption

Broader/Parent types + risk:IntegrityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -5069,6 +5411,9 @@

Denial of Service Attack (DoS)

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -5092,7 +5437,7 @@

Denial of Service Attack (DoS)

Source - ISO/IEC 27005:2018, ISO/IEC 27005:2018 + ISO/IEC 27005:2018 @@ -5385,6 +5730,9 @@

Distributed Denial of Service Attack (DDoS)

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -5609,6 +5957,9 @@

Equipment Failure

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -5693,6 +6044,9 @@

Equipment Malfunction

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -6012,6 +6366,9 @@

Extorsion

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -6815,6 +7172,9 @@

Fraud

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -7499,6 +7859,9 @@

Identity Fraud

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -7580,6 +7943,9 @@

Identity Theft

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -7862,7 +8228,7 @@

Incident

Date Created - 2024-02-14 + 2024-05-19 Date Modified @@ -9873,6 +10239,33 @@

None

Broader/Parent types + risk:DataBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:IntegrityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:IntegrityConcept + + Broader/Parent types risk:DataBreachrisk:SecurityBreachrisk:OperationalSecurityRisk @@ -10085,6 +10478,9 @@

Intercept Communications

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -10141,74 +10537,6 @@

Intercept Communications

-
-

Internal Security Threat

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
TermInternalSecurityThreatPrefixrisk
LabelInternal Security Threat
IRIhttps://w3id.org/dpv/risk#InternalSecurityThreat
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types dpv:RiskConcept -
DefinitionConcepts associated with security threats and issues that originate within the organisation
See More: section RISK-CONSEQUENCES in RISK -
-
- - - @@ -11284,8 +11612,17 @@

Malicious Code Attack

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -11365,8 +11702,17 @@

Malware Attack

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -12766,6 +13112,9 @@

Phishing Scam

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -13544,6 +13893,9 @@

Re-identification

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -21592,8 +21944,14 @@

Sabotage

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -21673,6 +22031,9 @@

Scam

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -21754,8 +22115,17 @@

Security Attack

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -21823,6 +22193,15 @@

Security Breach

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types + risk:IntegrityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -22365,10 +22744,16 @@

Spoofing

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept Broader/Parent types + risk:IntegrityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -22450,6 +22835,9 @@

System Failure

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -22534,8 +22922,17 @@

System Intrusion

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -22615,6 +23012,9 @@

System Malfunction

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -22933,8 +23333,17 @@

Unauthorised Access to Premises

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23014,8 +23423,17 @@

Unauthorised Activity

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23083,8 +23501,14 @@

Unauthorised Code Access

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23164,6 +23588,9 @@

Unauthorised Code Disclosure

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23247,6 +23674,9 @@

Unauthorised Code Modification

Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23326,6 +23756,9 @@

Unauthorised Data Access

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23407,6 +23840,9 @@

Unauthorised Data Disclosure

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23490,6 +23926,9 @@

Unauthorised Data Modification

Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23569,6 +24008,9 @@

Unauthorised Information Disclosure

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23650,6 +24092,9 @@

Unauthorised Re-Identification

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23728,6 +24173,9 @@

Unauthorised Resource Use

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23809,8 +24257,14 @@

Unauthorised System Access

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23892,6 +24346,9 @@

Unauthorised System Modification

Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23971,8 +24428,14 @@

Unwanted Code Deletion

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -24052,8 +24515,14 @@

Unwanted Data Deletion

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -24133,6 +24602,9 @@

Unwanted Disclosure of Data

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -25417,87 +25889,6 @@

Vulnerability

- - - -
-

Vulnerability Created

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
TermVulnerabilityCreatedPrefixrisk
LabelVulnerability Created
IRIhttps://w3id.org/dpv/risk#VulnerabilityCreated
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:InternalSecurityThreat - → dpv:RiskConcept -
DefinitionSomething that acts as or causes Vulnerability Created
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK -
-
@@ -25630,8 +26021,6 @@

Properties

- - @@ -26435,9 +26824,6 @@

has vulnerability

- - - @@ -27237,9 +27623,6 @@

refers to risk

- - - @@ -27334,8 +27717,6 @@

External

- - @@ -27637,9 +28018,6 @@

External

- - - @@ -28223,9 +28601,6 @@

External

- - -
diff --git a/2.1-dev/risk/index.html b/2.1-dev/risk/index.html index c8b42bf5f..4efbea699 100644 --- a/2.1-dev/risk/index.html +++ b/2.1-dev/risk/index.html @@ -1271,92 +1271,77 @@

Consequences and Impacts

dpv:hasImpact risk:RightsImpact . -

The risk concepts taxonomy is broadly divided into the following categories:

+

The concepts taxonomy is broadly divided into the following categories:

-
-

InternalSecurityThreat

-
    +
    +

    CIA Model

    +

    Confidentiality

    +
    • - risk:VulnerabilityCreated: Something that acts as or causes Vulnerability Created - go to full definition + risk:AuthorisationFailure: Something that acts as or causes Authorisation Failure + go to full definition
    • -
    -
    -
    -

    UserRisks

    -
    -
    -
    -

    ExternalSecurityThreat

    -
    • - risk:Blackmail: Something that acts as or causes Blackmail - go to full definition + risk:ConfidentialityBreach: Something that acts as or causes Confidentiality Breach + go to full definition
    • - risk:BruteForceAuthorisations: Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques - go to full definition - -
    • + risk:DataBreach: Something that acts as or causes Data Breach + go to full definition +
    • risk:Extorsion: Something that acts as or causes Extorsion @@ -1367,6 +1352,16 @@

      ExternalSecurityThreat

      risk:Fraud: Something that acts as or causes Fraud go to full definition +
    • +
    • + risk:IdentityFraud: Something that acts as or causes Identity Fraud + go to full definition + +
    • +
    • + risk:IdentityTheft: Something that acts as or causes Identity Theft + go to full definition +
    • risk:InterceptCommunications: Something that acts as or causes Interception of Communications @@ -1389,8 +1384,8 @@

      ExternalSecurityThreat

    • - risk:Sabotage: Something that acts as or causes Sabotage - go to full definition + risk:Reidentification: Something that acts as or causes Re-identification + go to full definition
    • @@ -1402,6 +1397,33 @@

      ExternalSecurityThreat

      risk:SecurityAttack: Something that acts as or causes an attack on security with the aim of undermining it go to full definition +
    • +
    • + risk:SecurityBreach: Something that acts as or causes Security Breach + go to full definition +
    • risk:Spoofing: Something that acts as or causes Spoofing @@ -1432,11 +1454,6 @@

      ExternalSecurityThreat

      risk:UnauthorisedCodeDisclosure: Something that acts as or causes Unauthorised Code Disclosure go to full definition -
    • -
    • - risk:UnauthorisedCodeModification: Something that acts as or causes Unauthorised Code Modification - go to full definition -
    • risk:UnauthorisedDataAccess: Something that acts as or causes Unauthorised Data Access @@ -1447,11 +1464,6 @@

      ExternalSecurityThreat

      risk:UnauthorisedDataDisclosure: Something that acts as or causes Unauthorised Data Disclosure go to full definition -
    • -
    • - risk:UnauthorisedDataModification: Something that acts as or causes Unauthorised Data Modification - go to full definition -
    • risk:UnauthorisedInformationDisclosure: Something that acts as or causes Unauthorised Information Disclosure @@ -1464,8 +1476,145 @@

      ExternalSecurityThreat

    • - risk:UnauthorisedResourceUse: Something that acts as or causes Unauthorised Resource Use - go to full definition + risk:UnauthorisedSystemAccess: Something that acts as or causes Unauthorised System Access + go to full definition + +
    • +
    • + risk:UnwantedDisclosureData: Something that acts as or causes Unwanted Disclosure of Data + go to full definition + +
    • +
    + +

    Integrity

    +
    -
    -
    -

    OperationalSecurityRisk

    -
      + +

      Availability

      +
      • - risk:AuthorisationFailure: Something that acts as or causes Authorisation Failure - go to full definition + risk:AvailabilityBreach: None + go to full definition
      • @@ -1519,13 +1662,39 @@

        OperationalSecurityRisk

      • - risk:CompromiseAccountCredentials: Something that acts as or causes Account Credentials to be compromised - go to full definition + risk:Cryptojacking: Something that acts as or causes Cryptojacking + go to full definition
      • - risk:DataCorruption: Something that acts as or causes Corruption of Data - go to full definition + risk:DataBreach: Something that acts as or causes Data Breach + go to full definition + +
      • +
      • + risk:DenialServiceAttack: Something that acts as or causes Denial of Service Attack (DoS) + go to full definition + +
      • +
      • + risk:DistributedDenialServiceAttack: Something that acts as or causes Distributed Denial of Service Attack (DDoS) + go to full definition
      • @@ -1539,18 +1708,23 @@

        OperationalSecurityRisk

      • - risk:IdentityFraud: Something that acts as or causes Identity Fraud - go to full definition + risk:MaliciousCodeAttack: Something that acts as or causes Malicious Code Attack + go to full definition
      • - risk:IdentityTheft: Something that acts as or causes Identity Theft - go to full definition + risk:MalwareAttack: Something that acts as or causes Malware Attack + go to full definition
      • - risk:Reidentification: Something that acts as or causes Re-identification - go to full definition + risk:Sabotage: Something that acts as or causes Sabotage + go to full definition + +
      • +
      • + risk:SecurityAttack: Something that acts as or causes an attack on security with the aim of undermining it + go to full definition
      • @@ -1581,13 +1755,13 @@

        OperationalSecurityRisk

    • - risk:Spoofing: Something that acts as or causes Spoofing - go to full definition + risk:SystemFailure: Something that acts as or causes System Failure + go to full definition
    • - risk:SystemFailure: Something that acts as or causes System Failure - go to full definition + risk:SystemIntrusion: Something that acts as or causes System Intrusion + go to full definition
    • @@ -1595,11 +1769,68 @@

      OperationalSecurityRisk

      go to full definition
    • +
    • + risk:UnauthorisedAccesstoPremises: Something that acts as or causes Unauthorised Access to Premises + go to full definition + +
    • +
    • + risk:UnauthorisedActivity: Something that acts as or causes Unauthorised Activity + go to full definition + +
    • +
    • + risk:UnauthorisedResourceUse: Something that acts as or causes Unauthorised Resource Use + go to full definition + +
    • +
    • + risk:UnwantedCodeDeletion: Something that acts as or causes Unwanted Code Deletion + go to full definition + +
    • +
    • + risk:UnwantedDataDeletion: Something that acts as or causes Unwanted Data Deletion + go to full definition + +
    -
    -
    -

    LegalRisk

    -
      +
    + +
    +

    User

    +
    +
    + +
    +

    Legal

    +
    • risk:CopyrightViolation: Something that acts as or causes Copyright Violation go to full definition @@ -1666,10 +1897,11 @@

      LegalRisk

    -
    -
    -

    ReputationalRisk

    -
      +
    + +
    +

    Reputational

    +
    • risk:LoseCredibility: Something that acts as or causes Loss of Credibility go to full definition @@ -1706,10 +1938,11 @@

      ReputationalRisk

    -
    -
    -

    SocietalRisk

    -
      +
    + +
    +

    Societal

    +
    • risk:Discrimination: Something that acts as or causes Discrimination go to full definition @@ -1761,10 +1994,11 @@

      SocietalRisk

    -
    -
    -

    IndividualRisk

    -
      +
    + +
    +

    Individual

    +
    • risk:Harm: Something that acts as or causes Harm to humans go to full definition @@ -1811,14 +2045,16 @@

      IndividualRisk

    -
    -
    -

    EnvironmentalRisk

    -
    -
    -
    -

    FinancialImpact

    -
      +
    + +
    +

    Environmental

    +
    +
    + +
    +

    Financial

    +
    • risk:Benefit: Something that acts as or causes benefits go to full definition @@ -1865,7 +2101,7 @@

      FinancialImpact

    -
    +
@@ -2128,8 +2364,6 @@

Classes

- - @@ -3007,6 +3241,12 @@

Authorisation Failure

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types + risk:IntegrityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -3088,6 +3328,33 @@

None

Broader/Parent types + risk:DataBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:IntegrityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:IntegrityConcept + + Broader/Parent types risk:DataBreachrisk:SecurityBreachrisk:OperationalSecurityRisk @@ -3392,6 +3659,9 @@

Blackmail

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -3473,8 +3743,14 @@

Brute Force Authorisations

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -3724,6 +4000,9 @@

Coercion

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -3883,6 +4162,9 @@

Component Failure

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -3955,6 +4237,9 @@

Component Malfunction

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -4027,6 +4312,15 @@

Compromise Account

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types + risk:IntegrityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -4108,6 +4402,9 @@

Compromise Account Credentials

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -4189,6 +4486,33 @@

Confidentiality Breach

Broader/Parent types + risk:DataBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:IntegrityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:IntegrityConcept + + Broader/Parent types risk:DataBreachrisk:SecurityBreachrisk:OperationalSecurityRisk @@ -4666,6 +4990,9 @@

Cryptojacking

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -4825,6 +5152,18 @@

Data Breach

Broader/Parent types + risk:SecurityBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:SecurityBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:SecurityBreach + → risk:IntegrityConcept + + Broader/Parent types risk:SecurityBreachrisk:OperationalSecurityRiskdpv:RiskConcept @@ -4910,6 +5249,9 @@

Data Corruption

Broader/Parent types + risk:IntegrityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -5069,6 +5411,9 @@

Denial of Service Attack (DoS)

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -5092,7 +5437,7 @@

Denial of Service Attack (DoS)

Source - ISO/IEC 27005:2018, ISO/IEC 27005:2018 + ISO/IEC 27005:2018 @@ -5385,6 +5730,9 @@

Distributed Denial of Service Attack (DDoS)

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -5609,6 +5957,9 @@

Equipment Failure

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -5693,6 +6044,9 @@

Equipment Malfunction

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -6012,6 +6366,9 @@

Extorsion

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -6815,6 +7172,9 @@

Fraud

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -7499,6 +7859,9 @@

Identity Fraud

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -7580,6 +7943,9 @@

Identity Theft

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -7862,7 +8228,7 @@

Incident

Date Created - 2024-02-14 + 2024-05-19 Date Modified @@ -9873,6 +10239,33 @@

None

Broader/Parent types + risk:DataBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:IntegrityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:IntegrityConcept + + Broader/Parent types risk:DataBreachrisk:SecurityBreachrisk:OperationalSecurityRisk @@ -10085,6 +10478,9 @@

Intercept Communications

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -10141,74 +10537,6 @@

Intercept Communications

-
-

Internal Security Threat

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
TermInternalSecurityThreatPrefixrisk
LabelInternal Security Threat
IRIhttps://w3id.org/dpv/risk#InternalSecurityThreat
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types dpv:RiskConcept -
DefinitionConcepts associated with security threats and issues that originate within the organisation
See More: section RISK-CONSEQUENCES in RISK -
-
- - - @@ -11284,8 +11612,17 @@

Malicious Code Attack

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -11365,8 +11702,17 @@

Malware Attack

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -12766,6 +13112,9 @@

Phishing Scam

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -13544,6 +13893,9 @@

Re-identification

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -21592,8 +21944,14 @@

Sabotage

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -21673,6 +22031,9 @@

Scam

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -21754,8 +22115,17 @@

Security Attack

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -21823,6 +22193,15 @@

Security Breach

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types + risk:IntegrityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -22365,10 +22744,16 @@

Spoofing

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept Broader/Parent types + risk:IntegrityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -22450,6 +22835,9 @@

System Failure

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -22534,8 +22922,17 @@

System Intrusion

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -22615,6 +23012,9 @@

System Malfunction

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -22933,8 +23333,17 @@

Unauthorised Access to Premises

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23014,8 +23423,17 @@

Unauthorised Activity

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23083,8 +23501,14 @@

Unauthorised Code Access

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23164,6 +23588,9 @@

Unauthorised Code Disclosure

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23247,6 +23674,9 @@

Unauthorised Code Modification

Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23326,6 +23756,9 @@

Unauthorised Data Access

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23407,6 +23840,9 @@

Unauthorised Data Disclosure

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23490,6 +23926,9 @@

Unauthorised Data Modification

Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23569,6 +24008,9 @@

Unauthorised Information Disclosure

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23650,6 +24092,9 @@

Unauthorised Re-Identification

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23728,6 +24173,9 @@

Unauthorised Resource Use

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23809,8 +24257,14 @@

Unauthorised System Access

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23892,6 +24346,9 @@

Unauthorised System Modification

Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23971,8 +24428,14 @@

Unwanted Code Deletion

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -24052,8 +24515,14 @@

Unwanted Data Deletion

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -24133,6 +24602,9 @@

Unwanted Disclosure of Data

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -25417,87 +25889,6 @@

Vulnerability

- - - -
-

Vulnerability Created

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
TermVulnerabilityCreatedPrefixrisk
LabelVulnerability Created
IRIhttps://w3id.org/dpv/risk#VulnerabilityCreated
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:InternalSecurityThreat - → dpv:RiskConcept -
DefinitionSomething that acts as or causes Vulnerability Created
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK -
-
@@ -25630,8 +26021,6 @@

Properties

- - @@ -26435,9 +26824,6 @@

has vulnerability

- - - @@ -27237,9 +27623,6 @@

refers to risk

- - - @@ -27334,8 +27717,6 @@

External

- - @@ -27637,9 +28018,6 @@

External

- - - @@ -28223,9 +28601,6 @@

External

- - -
diff --git a/2.1-dev/risk/modules/risk_consequences-owl.jsonld b/2.1-dev/risk/modules/risk_consequences-owl.jsonld index e261bb3b6..eb1314cd5 100644 --- a/2.1-dev/risk/modules/risk_consequences-owl.jsonld +++ b/2.1-dev/risk/modules/risk_consequences-owl.jsonld @@ -1,9 +1,9 @@ [ { - "@id": "https://w3id.org/dpv/risk/owl#IdentityFraud", + "@id": "https://w3id.org/dpv/risk/owl#PhishingScam", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -25,7 +25,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nbc1a7f7ae94c4fde84913e9622b759f6" + "@id": "_:Nb657a11b610f419a86eb9ea4a94e7e37" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -35,7 +35,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -47,34 +50,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Identity Fraud" + "@value": "Something that acts as or causes Phishing Scam" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identity Fraud" + "@value": "Phishing Scam" } ] }, { - "@id": "_:Nbc1a7f7ae94c4fde84913e9622b759f6", + "@id": "_:Nb657a11b610f419a86eb9ea4a94e7e37", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseNegotiatingCapacity", + "@id": "https://w3id.org/dpv/risk/owl#Coercion", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -99,7 +102,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd8a232e440f041b496b97da8007b588a" + "@id": "_:Nc78302d156fb497aae9594fa63bb9fa7" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -109,7 +112,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -121,37 +127,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Negotiating Capacity" + "@value": "Something that acts as or causes Coercion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Negotiating Capacity" + "@value": "Coercion" } ] }, { - "@id": "_:Nd8a232e440f041b496b97da8007b588a", + "@id": "_:Nc78302d156fb497aae9594fa63bb9fa7", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk", + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -173,45 +179,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that arise during operational processes" + "@value": "Concepts associated with security threats that are likely to originate externally" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Operational Security Risk" + "@value": "External Security Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedAccesstoPremises", + "@id": "https://w3id.org/dpv/risk/owl#EnvironmentalRisk", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N2b8ae4e96b21406bb91bfdec8f460776" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -219,7 +203,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -231,286 +215,266 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Access to Premises" + "@value": "Risks and issues that have their origin in environment or can affect the environment at large" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Access to Premises" + "@value": "Environmental Risk" } ] }, { - "@id": "_:N2b8ae4e96b21406bb91bfdec8f460776", + "@id": "https://w3id.org/dpv/risk/owl#", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/ns/dx/prof/Profile", + "http://www.w3.org/2002/07/owl#Ontology" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/bibliographicCitation": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "http://www.w3.org/2004/02/skos/core" + }, + { + "@id": "http://www.w3.org/2002/07/owl" + }, + { + "@value": "http://www.w3.org/2000/01/rdf-schema" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedResourceUse", - "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ + { + "@value": "Julian Flake" + }, + { + "@value": "Fajar Ekaputra" + }, { "@value": "Harshvardhan J. Pandit" + }, + { + "@value": "Beatriz Esteves" + }, + { + "@value": "Axel Polleres" + }, + { + "@value": "Georg P. Krog" + }, + { + "@value": "Delaram Golpayegani" } ], "http://purl.org/dc/terms/created": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@language": "en", + "@value": "2022-08-14" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/creator": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "@language": "en", + "@value": "Paul Ryan" + }, { - "@id": "_:Nd4175f97fd33423f9014c3d690d56fad" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "@language": "en", + "@value": "Georg P. Krog" + }, { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "@language": "en", + "@value": "Delaram Golpayegani" + }, { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "@language": "en", + "@value": "Harshvardhan J. Pandit" + }, { "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "@value": "Beatriz Esteves" + }, { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Resource Use" + "@value": "Rob Brennan" + }, + { + "@language": "en", + "@value": "Julian Flake" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/description": [ { "@language": "en", - "@value": "Unauthorised Resource Use" + "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" } - ] - }, - { - "@id": "_:Nd4175f97fd33423f9014c3d690d56fad", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/hasVersion": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/identifier": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://w3id.org/dpv/risk" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#DataCorruption", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/issued": [ { - "@value": "Harshvardhan J. Pandit" + "@language": "en", + "@value": "2022-08-14" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/license": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://www.w3.org/copyright/document-license-2023/" } ], "http://purl.org/dc/terms/modified": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@language": "en", + "@value": "2024-07-13" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/publisher": [ { - "@id": "_:Ncd7b81f0daef4263a47284ebb48b83f6" + "@id": "https://www.w3.org/" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://www.w3.org/groups/cg/dpvcg/" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/title": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@language": "en", + "@value": "Risk Concepts" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/ontology/bibo/doi": [ { - "@language": "en", - "@value": "modified" + "@value": "10.5281/zenodo.12505841" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/ontology/bibo/status": [ { - "@language": "en", - "@value": "Something that acts as or causes Corruption of Data" + "@value": "http://purl.org/ontology/bibo/status/published" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/vocab/vann/preferredNamespacePrefix": [ { - "@language": "en", - "@value": "Data Corruption" + "@value": "risk" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "http://purl.org/vocab/vann/preferredNamespaceUri": [ { - "@language": "en", - "@value": "This concept was called \"Corruption Data\" in DPV 2.0" + "@value": "https://w3id.org/dpv/risk#" } - ] - }, - { - "@id": "_:Ncd7b81f0daef4263a47284ebb48b83f6", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#Label": [ { - "@value": "ISO/IEC 27005:2018" + "@language": "en", + "@value": "RISK" } ], - "https://schema.org/url": [ + "http://www.w3.org/2002/07/owl#versionIRI": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/2.1-dev/risk/owl#" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#Fee", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2002/07/owl#versionInfo": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "2.1-dev" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/ns/dx/prof/hasResource": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" - } - ], - "http://purl.org/dc/terms/modified": [ + "@id": "https://w3id.org/dpv/examples" + }, { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld" + }, { - "@language": "en", - "@value": "DGA 2.10" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "@id": "https://w3id.org/dpv/primer" + }, { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "@id": "https://w3id.org/dpv/guides" + }, { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-html" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/ns/dx/prof/isProfileOf": [ { - "@language": "en", - "@value": "modified" + "@id": "http://www.w3.org/2002/07/owl" + }, + { + "@id": "https://w3id.org/dpv/owl" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://xmlns.com/foaf/0.1/logo": [ { - "@language": "en", - "@value": "Something that acts as or provides fees e.g. for using a service" + "@id": "https://w3id.org/dpv/media/logo.png" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/version": [ { - "@language": "en", - "@value": "Fee" + "@value": "2.1-dev" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://www.w3.org/TR/json-ld11/" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://www.iana.org/assignments/media-types/application/ld+json" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "accepted" + "@value": "Risk Concepts - JSON-LD serialiation" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "Concepts associated with security threats that are likely to originate externally" + "@id": "https://w3id.org/dpv/risk/risk-owl.jsonld" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "External Security Threat" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PhishingScam", + "@id": "https://w3id.org/dpv/risk/owl#LoseOpportunity", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -532,7 +496,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N2039355de6a7474a8ab35355297e33c6" + "@id": "_:N2ea871931e3746e4aff469f67008e44f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -542,7 +506,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -554,34 +518,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Phishing Scam" + "@value": "Something that acts as or causes Loss of Opportunity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Phishing Scam" + "@value": "Lose of Opportunity" } ] }, { - "@id": "_:N2039355de6a7474a8ab35355297e33c6", + "@id": "_:N2ea871931e3746e4aff469f67008e44f", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RightsExercisePrevention", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingLegalObligation", "@type": [ "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -589,13 +553,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -604,6 +568,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N0b5dd4cc254540f49140434e86708abb" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -611,39 +580,86 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Prevent Exercising of Rights" + "@value": "Something that acts as or causes Violation of Legal Obligations" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Prevent Exercising of Rights" + "@value": "Violation of Legal Obligations" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0" + "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnwantedDataDeletion", + "@id": "_:N0b5dd4cc254540f49140434e86708abb", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/examples", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Examples for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/examples" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Terrorism", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -665,7 +681,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N7ff2bed0d152400e90aff3c52f1320b0" + "@id": "_:N84e706a33b7c462194d2c8fb5c04326c" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -675,7 +691,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -687,18 +703,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Data Deletion" + "@value": "Something that acts as or causes Terrorism" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Data Deletion" + "@value": "Terrorism" } ] }, { - "@id": "_:N7ff2bed0d152400e90aff3c52f1320b0", + "@id": "_:N84e706a33b7c462194d2c8fb5c04326c", "@type": [ "https://schema.org/WebPage" ], @@ -714,10 +730,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Sabotage", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeDisclosure", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -739,7 +755,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nddcd9454cd3f48779b8299743d6f1150" + "@id": "_:Nc4c391b305be479eb0e623d887a478ac" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -750,6 +766,9 @@ "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -761,37 +780,67 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Sabotage" + "@value": "Something that acts as or causes Unauthorised Code Disclosure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sabotage" + "@value": "Unauthorised Code Disclosure" } ] }, { - "@id": "_:Nddcd9454cd3f48779b8299743d6f1150", + "@id": "_:Nc4c391b305be479eb0e623d887a478ac", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SystemFailure", + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Risks and issues that affect or have the potential to affect specific individuals" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Individual Risk" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#MaterialDamage", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -802,7 +851,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-30" } ], "http://purl.org/dc/terms/modified": [ @@ -811,11 +860,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Ndb0e0e85d6ad4dabbf9efc7a0f2cb59a" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -823,7 +867,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -835,54 +879,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Failure" + "@value": "Something that acts as or causes Material Damage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Failure" + "@value": "Material Damage" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Here system refers to both hardware and software systems" + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" } ] }, { - "@id": "_:Ndb0e0e85d6ad4dabbf9efc7a0f2cb59a", + "@id": "https://w3id.org/dpv/risk/owl#DistributedDenialServiceAttack", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#LoseOpportunity", - "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -893,7 +921,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0e6dade5a2814d0f815e1c5dd41f1c65" + "@id": "_:N64ebcf10636d495599fc0fd262e44103" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -903,7 +931,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -915,18 +946,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Opportunity" + "@value": "Something that acts as or causes Distributed Denial of Service Attack (DDoS)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Opportunity" + "@value": "Distributed Denial of Service Attack (DDoS)" } ] }, { - "@id": "_:N0e6dade5a2814d0f815e1c5dd41f1c65", + "@id": "_:N64ebcf10636d495599fc0fd262e44103", "@type": [ "https://schema.org/WebPage" ], @@ -942,12 +973,34 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IndividualHealthSafety", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingEthicsCode", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N5971f1bb7e3149b49a4335be11b0926f" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -955,89 +1008,100 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Individual Health & Safety" - } - ] - }, - { - "@id": "https://w3id.org/dpv/examples", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" + "@value": "Something that acts as or causes Violation of Ethics Code" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@language": "en", + "@value": "Violating Ethics Code" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "Examples for Data Privacy Vocabulary" + "@language": "en", + "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0" } + ] + }, + { + "@id": "_:N5971f1bb7e3149b49a4335be11b0926f", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/examples" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "https://schema.org/url": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld", + "@id": "https://w3id.org/dpv/risk/owl#ComponentMalfunction", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.w3.org/TR/json-ld11/" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://www.iana.org/assignments/media-types/application/ld+json" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "Risk Concepts - JSON-LD serialiation" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.jsonld" + "@language": "en", + "@value": "Something that acts as or causes Component Malfunction" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@language": "en", + "@value": "Component Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#BruteForceAuthorisations", + "@id": "https://w3id.org/dpv/risk/owl#Damage", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1048,7 +1112,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-30" } ], "http://purl.org/dc/terms/modified": [ @@ -1057,11 +1121,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Ned6a23a4f6894305bc5d07abc6872b8e" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -1069,7 +1128,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1081,37 +1140,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques" + "@value": "Something that acts as or causes Damage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Brute Force Authorisations" - } - ] - }, - { - "@id": "_:Ned6a23a4f6894305bc5d07abc6872b8e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Damage" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SystemMalfunction", + "@id": "https://w3id.org/dpv/risk/owl#SexualViolence", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1133,7 +1176,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N1c2325e64024454ebc2e79f9e388cf3b" + "@id": "_:Ncb4b4f28b9894b79bfd2a5d2dd41f88f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1143,7 +1186,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1155,40 +1198,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Malfunction" + "@value": "Something that acts as or causes Sexual Violence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Malfunction" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here system refers to both hardware and software systems" + "@value": "Sexual Violence" } ] }, { - "@id": "_:N1c2325e64024454ebc2e79f9e388cf3b", + "@id": "_:Ncb4b4f28b9894b79bfd2a5d2dd41f88f", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedInformationDisclosure", + "@id": "https://w3id.org/dpv/risk/owl#LoseGoodwill", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -1213,7 +1250,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb2d6659136cf4d2fa881ae5798bf0e58" + "@id": "_:N194bc10f01ef4bdb99f12487816e6826" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1223,7 +1260,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1235,69 +1272,39 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Information Disclosure" + "@value": "Something that acts as or causes Loss of Goodwill" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Information Disclosure" + "@value": "Lose of Goodwill" } ] }, { - "@id": "_:Nb2d6659136cf4d2fa881ae5798bf0e58", + "@id": "_:N194bc10f01ef4bdb99f12487816e6826", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SocietalHealthSafety", + "@id": "https://w3id.org/dpv/risk/owl#DataCorruption", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Societal Health & Safety" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#EquipmentFailure", - "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], "http://purl.org/dc/terms/contributor": [ { "@value": "Harshvardhan J. Pandit" @@ -1317,7 +1324,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nc281053cb7ff4095b5eef42624c4ff46" + "@id": "_:N8aaec0d1fefb4744abcf3099509b1988" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1326,6 +1333,9 @@ } ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, { "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } @@ -1333,30 +1343,30 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Equipment Failure" + "@value": "Something that acts as or causes Corruption of Data" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Equipment Failure" + "@value": "Data Corruption" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Here equipment refers to physical equipment" + "@value": "This concept was called \"Corruption Data\" in DPV 2.0" } ] }, { - "@id": "_:Nc281053cb7ff4095b5eef42624c4ff46", + "@id": "_:N8aaec0d1fefb4744abcf3099509b1988", "@type": [ "https://schema.org/WebPage" ], @@ -1372,10 +1382,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Injury", + "@id": "https://w3id.org/dpv/risk/owl#PersonalSafetyEndangerment", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1397,7 +1407,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N1ef56bb9fadb431ba4c270603c7acdec" + "@id": "_:Na783f8da28594e8794173492db9ecac9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1407,7 +1417,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1419,18 +1429,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Injury" + "@value": "Something that acts as or causes Personal Safety Endangerment" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Injury" + "@value": "Personal Safety Endangerment" } ] }, { - "@id": "_:N1ef56bb9fadb431ba4c270603c7acdec", + "@id": "_:Na783f8da28594e8794173492db9ecac9", "@type": [ "https://schema.org/WebPage" ], @@ -1446,7 +1456,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Blackmail", + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityBreach", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -1471,7 +1481,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N3ef9f5a9eb554279905f69c263712205" + "@id": "_:N0571680fc6554da2a384a2e851d510c0" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1481,7 +1491,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#DataBreach" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1493,18 +1506,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Blackmail" + "@value": "Something that acts as or causes Confidentiality Breach" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Blackmail" + "@value": "Confidentiality Breach" } ] }, { - "@id": "_:N3ef9f5a9eb554279905f69c263712205", + "@id": "_:N0571680fc6554da2a384a2e851d510c0", "@type": [ "https://schema.org/WebPage" ], @@ -1520,21 +1533,21 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ErroneousSystemUse", + "@id": "https://w3id.org/dpv/risk/owl#Misuse", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Delaram Golpayegani" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-06-11" } ], "http://purl.org/dc/terms/modified": [ @@ -1543,11 +1556,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Ne874eff2b0f74da79392c36cf77d71f1" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -1567,37 +1575,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Erroneous System Use" + "@value": "Something that acts as or causes Misuse" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Erroneous System Use" - } - ] - }, - { - "@id": "_:Ne874eff2b0f74da79392c36cf77d71f1", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityBreach", + "@id": "https://w3id.org/dpv/risk/owl#EquipmentMalfunction", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1619,7 +1611,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N804ad242900c474395dd117c74dace8e" + "@id": "_:N53bfad5db8324151841ce01472d06f41" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1629,7 +1621,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#DataBreach" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1641,18 +1636,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Confidentiality Breach" + "@value": "Something that acts as or causes Equipment Malfunction" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confidentiality Breach" + "@value": "Equipment Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here equipment refers to physical equipment" } ] }, { - "@id": "_:N804ad242900c474395dd117c74dace8e", + "@id": "_:N53bfad5db8324151841ce01472d06f41", "@type": [ "https://schema.org/WebPage" ], @@ -1668,7 +1669,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemAccess", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingStatutoryObligations", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -1693,7 +1694,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N4387faf4bb854435bfdc47ebf666782a" + "@id": "_:Ne3511d0b904a403e93b1538888ad1023" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1703,30 +1704,36 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised System Access" + "@value": "Something that acts as or causes Violation of Statutory Obligations" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised System Access" + "@value": "Violation of Statutory Obligations" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0" } ] }, { - "@id": "_:N4387faf4bb854435bfdc47ebf666782a", + "@id": "_:Ne3511d0b904a403e93b1538888ad1023", "@type": [ "https://schema.org/WebPage" ], @@ -1742,41 +1749,33 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingContractualObligation", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "accepted" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "Risks and issues that affect or have the potential to affect specific individuals" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "Individual Risk" + "@id": "_:N638499f1a35f4f94abab8a1e6e4bf97d" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IntentionalMisuse", - "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -1785,44 +1784,66 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Intentional Misuse" + "@value": "Something that acts as or causes Violation of Contractual Obligations" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Intentional Misuse" + "@value": "Violation of Contractual Obligation" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RightsLimitation", + "@id": "_:N638499f1a35f4f94abab8a1e6e4bf97d", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Harm", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-13" } ], "http://purl.org/dc/terms/modified": [ @@ -1838,7 +1859,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1850,24 +1871,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Limitation of Rights" + "@value": "Something that acts as or causes Harm to humans" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Limitation of Rights" + "@value": "Harm" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0" + "@value": "This concept refers to the general abstract notion of harm" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DataBreach", + "@id": "https://w3id.org/dpv/risk/owl#IllegalDataProcessing", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -1892,15 +1913,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N82834c9f1ecf4644ab2d9343a1169c62" - } - ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples/owl#E0071" - }, - { - "@id": "https://w3id.org/dpv/examples/owl#E0069" + "@id": "_:Nfbea264abf694083a7d1db8b2101092b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1910,7 +1923,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1922,18 +1935,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Data Breach" + "@value": "Something that acts as or causes Illegal Processing of Data" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Breach" + "@value": "Illegal Data Processing" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0" } ] }, { - "@id": "_:N82834c9f1ecf4644ab2d9343a1169c62", + "@id": "_:Nfbea264abf694083a7d1db8b2101092b", "@type": [ "https://schema.org/WebPage" ], @@ -1949,7 +1968,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PublicOrderBreach", + "@id": "https://w3id.org/dpv/risk/owl#RightsViolation", "@type": [ "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1957,13 +1976,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://purl.org/dc/terms/modified": [ @@ -1972,11 +1991,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N2bd2812bbacb46319d2bdb0e95e02f65" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -1984,7 +1998,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1996,60 +2010,72 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Public Order Breach" + "@value": "Something that acts as or causes Violation of Rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Public Order Breach" + "@value": "Violation of Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0" } ] }, { - "@id": "_:N2bd2812bbacb46319d2bdb0e95e02f65", + "@id": "https://w3id.org/dpv/risk/owl#Discrimination", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Georg P. Krog" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-19" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://www.w3.org/TR/turtle/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.iana.org/assignments/media-types/text/turtle" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "Risk Concepts - Turtle serialiation" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.ttl" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@language": "en", + "@value": "Something that acts as or causes Discrimination" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Discrimination" } ] }, @@ -2085,12 +2111,34 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#JudicialPenalty", + "@id": "https://w3id.org/dpv/risk/owl#LoseTrust", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N95b0eaaa71714fb48e2d00a428e03220" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -2098,7 +2146,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2110,23 +2158,61 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that involves or causes judicial penalties to be paid" + "@value": "Something that acts as or causes Loss of Trust" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Judicial Penalty" + "@value": "Lose of Trust" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ComponentMalfunction", + "@id": "_:N95b0eaaa71714fb48e2d00a428e03220", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IdentityTheft", "@type": [ "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N33b7660d50a4461e927089957dfd848b" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -2135,6 +2221,9 @@ "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2146,58 +2235,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Component Malfunction" + "@value": "Something that acts as or causes Identity Theft" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Component Malfunction" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of" + "@value": "Identity Theft" } ] }, { - "@id": "https://w3id.org/dpv/guides", + "@id": "_:N33b7660d50a4461e927089957dfd848b", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Guides for Data Privacy Vocabulary" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/guides" + "@value": "ENISA Threat Taxonomy 2016" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "https://schema.org/url": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnwantedDisclosureData", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedAccesstoPremises", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2219,7 +2287,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N12b2c9394da44250a5ab771adc23fab8" + "@id": "_:N7487c570f8f54358874e08fa38c8f27d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2228,8 +2296,17 @@ } ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, { "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2241,18 +2318,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Disclosure of Data" + "@value": "Something that acts as or causes Unauthorised Access to Premises" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Disclosure of Data" + "@value": "Unauthorised Access to Premises" } ] }, { - "@id": "_:N12b2c9394da44250a5ab771adc23fab8", + "@id": "_:N7487c570f8f54358874e08fa38c8f27d", "@type": [ "https://schema.org/WebPage" ], @@ -2268,10 +2345,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingStatutoryObligations", + "@id": "https://w3id.org/dpv/risk/owl#UnwantedDisclosureData", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2293,7 +2370,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb5000792f7ae42ffb4c7efe3b93be7df" + "@id": "_:Nf14815c8a8694940bcdb35d12bf37b11" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2303,36 +2380,33 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Statutory Obligations" + "@value": "Something that acts as or causes Unwanted Disclosure of Data" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Statutory Obligations" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0" + "@value": "Unwanted Disclosure of Data" } ] }, { - "@id": "_:Nb5000792f7ae42ffb4c7efe3b93be7df", + "@id": "_:Nf14815c8a8694940bcdb35d12bf37b11", "@type": [ "https://schema.org/WebPage" ], @@ -2348,12 +2422,34 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Privacy", + "@id": "https://w3id.org/dpv/risk/owl#LoseReputation", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N90d89ca8a8594ecabee31205aee25395" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -2361,7 +2457,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2370,44 +2466,65 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Loss of Reputation" + } + ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Privacy" + "@value": "Lose of Reputation" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityBreach", + "@id": "_:N90d89ca8a8594ecabee31205aee25395", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk/owl#DataBreach" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "accepted" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact", + "@id": "https://w3id.org/dpv/risk/owl#Fee", "@type": [ "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-04-14" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "DGA 2.10" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -2415,30 +2532,30 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Things that cause or have the potential to impact financial resources" + "@value": "Something that acts as or provides fees e.g. for using a service" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Impact" + "@value": "Fee" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Coercion", + "@id": "https://w3id.org/dpv/risk/owl#SystemIntrusion", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -2463,7 +2580,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N61513676426149faae9e58063eb667d8" + "@id": "_:Ne8bd9725515e46d0a941f4a4665a7868" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2472,8 +2589,17 @@ } ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, { "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2485,39 +2611,61 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Coercion" + "@value": "Something that acts as or causes System Intrusion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Coercion" + "@value": "System Intrusion" } ] }, { - "@id": "_:N61513676426149faae9e58063eb667d8", + "@id": "_:Ne8bd9725515e46d0a941f4a4665a7868", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#JudicialCosts", + "@id": "https://w3id.org/dpv/risk/owl#Extorsion", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N78e6085a5a4a4a08adbcdb4af46722d9" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -2525,7 +2673,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2537,39 +2688,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that involves or causes judicial costs to be paid" + "@value": "Something that acts as or causes Extorsion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Judicial Costs" + "@value": "Extorsion" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Harm", + "@id": "_:N78e6085a5a4a4a08adbcdb4af46722d9", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ENISA Threat Taxonomy 2016" } ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-13" - } - ], - "http://purl.org/dc/terms/modified": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IndividualHealthSafety", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -2587,41 +2737,29 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Harm to humans" - } - ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Harm" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept refers to the general abstract notion of harm" + "@value": "Individual Health & Safety" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Renumeration", + "@id": "https://w3id.org/dpv/risk/owl#MalwareAttack", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -2630,6 +2768,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6fb9cc1510c4401a9c582949b7a8c8b7" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -2637,7 +2780,16 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2649,39 +2801,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides renumeration which is in monetary or financial form" + "@value": "Something that acts as or causes Malware Attack" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remuneration" + "@value": "Malware Attack" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Detriment", + "@id": "_:N6fb9cc1510c4401a9c582949b7a8c8b7", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" - } + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/name": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], - "http://purl.org/dc/terms/modified": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -2690,7 +2841,16 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2702,21 +2862,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Detriment" + "@value": "Something that acts as or causes an attack on security with the aim of undermining it" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Detriment" + "@value": "Security Attack" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity", + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2726,7 +2886,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2738,18 +2898,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Activity" + "@value": "Risks and issues that affect the reputation of the organisation" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Activity" + "@value": "Reputational Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SystemIntrusion", + "@id": "https://w3id.org/dpv/risk/owl#SocialDisadvantage", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -2757,13 +2917,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-19" } ], "http://purl.org/dc/terms/modified": [ @@ -2772,11 +2932,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N7a5848cbabb14c8ea2d162432eba32f0" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -2784,7 +2939,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2796,37 +2951,52 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Intrusion" + "@value": "Something that acts as or causes Social Disadvantage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Intrusion" + "@value": "Social Disadvantage" } ] }, { - "@id": "_:N7a5848cbabb14c8ea2d162432eba32f0", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/format": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - RDF/XML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.rdf" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedInformationDisclosure", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2848,7 +3018,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nee086e9da9f643e2837c115c27f1cabc" + "@id": "_:N89971235b5e34930a94f46c696e0ac94" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2858,7 +3028,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2870,34 +3043,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Security Breach" + "@value": "Something that acts as or causes Unauthorised Information Disclosure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Security Breach" + "@value": "Unauthorised Information Disclosure" } ] }, { - "@id": "_:Nee086e9da9f643e2837c115c27f1cabc", + "@id": "_:N89971235b5e34930a94f46c696e0ac94", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MalwareAttack", + "@id": "https://w3id.org/dpv/risk/owl#Reidentification", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -2911,7 +3084,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-19" } ], "http://purl.org/dc/terms/modified": [ @@ -2920,11 +3093,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N933b42794d4f41a39ee17bc9b20bf774" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -2932,7 +3100,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2944,48 +3115,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Malware Attack" + "@value": "Something that acts as or causes Re-identification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Malware Attack" - } - ] - }, - { - "@id": "_:N933b42794d4f41a39ee17bc9b20bf774", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "Re-identification" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@language": "en", + "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedReidentification", + "@id": "https://w3id.org/dpv/risk/owl#RightsImpact", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -2994,6 +3155,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N7b552ef83c274f84b167cc68c23676bb" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -3001,7 +3167,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/owl#Impact" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3013,18 +3182,40 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Re-Identification" + "@value": "Something that acts as or causes Impact to Rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Re-Identification" + "@value": "Impact to Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ImpactToRights\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CopyrightViolation", + "@id": "_:N7b552ef83c274f84b167cc68c23676bb", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataDisclosure", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -3049,7 +3240,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N73922ea12cd34584b91e209f306167ae" + "@id": "_:N7c66233cabb64c2486ae612a1ff6b01d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3059,7 +3250,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3071,37 +3265,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Copyright Violation" + "@value": "Something that acts as or causes Unauthorised Data Disclosure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Copyright Violation" + "@value": "Unauthorised Data Disclosure" } ] }, { - "@id": "_:N73922ea12cd34584b91e209f306167ae", + "@id": "_:N7c66233cabb64c2486ae612a1ff6b01d", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemModification", + "@id": "https://w3id.org/dpv/risk/owl#HumanErrors", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3123,7 +3317,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0c47798cd08a44d790a99ee3c58dcfb9" + "@id": "_:Na882c52257364f5896e5b38b50bb08fe" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3133,7 +3327,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3145,34 +3339,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised System Modification" + "@value": "Something that acts as or causes Human Errors" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised System Modification" + "@value": "Human Errors" } ] }, { - "@id": "_:N0c47798cd08a44d790a99ee3c58dcfb9", + "@id": "_:Na882c52257364f5896e5b38b50bb08fe", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MaliciousCodeAttack", + "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -3197,7 +3391,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N7beef942706b41468112e467b91c5f39" + "@id": "_:Nb3034bc7cf1e485b85582c21529ebaa4" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3207,7 +3401,16 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3219,34 +3422,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Malicious Code Attack" + "@value": "Something that acts as or causes Security Breach" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Malicious Code Attack" + "@value": "Security Breach" } ] }, { - "@id": "_:N7beef942706b41468112e467b91c5f39", + "@id": "_:Nb3034bc7cf1e485b85582c21529ebaa4", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Fraud", + "@id": "https://w3id.org/dpv/risk/owl#SystemMalfunction", "@type": [ "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3271,7 +3474,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd4dde0f0f01e4d739b22630aa8ad7d7a" + "@id": "_:N18aeaa08367a4c56822793249e34feae" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3281,7 +3484,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3293,18 +3499,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Fraud" + "@value": "Something that acts as or causes System Malfunction" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Fraud" + "@value": "System Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here system refers to both hardware and software systems" } ] }, { - "@id": "_:Nd4dde0f0f01e4d739b22630aa8ad7d7a", + "@id": "_:N18aeaa08367a4c56822793249e34feae", "@type": [ "https://schema.org/WebPage" ], @@ -3320,10 +3532,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Cryptojacking", + "@id": "https://w3id.org/dpv/risk/owl#AuthorisationFailure", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3345,7 +3557,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Neb960f38438d48258bee0ebae96be48e" + "@id": "_:N588812d3250243469d4d5b0cbd82dc9e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3355,7 +3567,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3367,37 +3585,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Cryptojacking" + "@value": "Something that acts as or causes Authorisation Failure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cryptojacking" + "@value": "Authorisation Failure" } ] }, { - "@id": "_:Neb960f38438d48258bee0ebae96be48e", + "@id": "_:N588812d3250243469d4d5b0cbd82dc9e", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Landscape 2021" + "@value": "ENISa Trust Services Security Incidents 2021" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" + "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataDisclosure", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingCodeOfConduct", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3419,7 +3637,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nf415d60c8c8849ba95e5611d481b06ce" + "@id": "_:Nb240be91051241df8fe71581eedea8cc" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3429,30 +3647,36 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Disclosure" + "@value": "Something that acts as or causes Violation of Code of Conduct" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Disclosure" + "@value": "Violating Code of Conduct" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0" } ] }, { - "@id": "_:Nf415d60c8c8849ba95e5611d481b06ce", + "@id": "_:Nb240be91051241df8fe71581eedea8cc", "@type": [ "https://schema.org/WebPage" ], @@ -3468,7 +3692,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AuthorisationFailure", + "@id": "https://w3id.org/dpv/risk/owl#Renumeration", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -3476,13 +3700,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], "http://purl.org/dc/terms/modified": [ @@ -3491,11 +3715,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N8906a1d2a7bd4484854e88a2dc1b93a5" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -3503,7 +3722,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3515,34 +3734,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Authorisation Failure" + "@value": "Something that acts as or provides renumeration which is in monetary or financial form" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Authorisation Failure" - } - ] - }, - { - "@id": "_:N8906a1d2a7bd4484854e88a2dc1b93a5", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISa Trust Services Security Incidents 2021" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" + "@value": "Remuneration" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Scam", + "@id": "https://w3id.org/dpv/risk/owl#FinancialLoss", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -3567,7 +3770,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N498890541a5449e290f0aea406ea5090" + "@id": "_:N698d6b9272804e2dba685b14f6e69152" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3577,7 +3780,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3589,18 +3792,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Scam" + "@value": "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Scam" + "@value": "Financial Loss" } ] }, { - "@id": "_:N498890541a5449e290f0aea406ea5090", + "@id": "_:N698d6b9272804e2dba685b14f6e69152", "@type": [ "https://schema.org/WebPage" ], @@ -3616,10 +3819,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Extorsion", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedResourceUse", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3641,7 +3844,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N40f94dff19814aa6ae7d3074eb3409d8" + "@id": "_:N605e2cac18a74200ab14cc33e319b6cb" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3652,6 +3855,9 @@ "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3663,60 +3869,99 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Extorsion" + "@value": "Something that acts as or causes Unauthorised Resource Use" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extorsion" + "@value": "Unauthorised Resource Use" } ] }, { - "@id": "_:N40f94dff19814aa6ae7d3074eb3409d8", + "@id": "_:N605e2cac18a74200ab14cc33e319b6cb", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PhysicalAssault", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/turtle/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/turtle" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - Turtle serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.ttl" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SocietalHealthSafety", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "_:N4414613afa8c4456b9a9b6c3f17a7a0c" + "@language": "en", + "@value": "Societal Health & Safety" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AccidentalMisuse", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -3725,7 +3970,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3737,37 +3982,57 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Physical Assault" + "@value": "Accidental Misuse" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Physical Assault" + "@value": "Accidental Misuse" } ] }, { - "@id": "_:N4414613afa8c4456b9a9b6c3f17a7a0c", + "@id": "https://w3id.org/dpv/risk/owl#JudicialCosts", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that involves or causes judicial costs to be paid" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Judicial Costs" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#HumanErrors", + "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccount", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3789,7 +4054,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N7d9296887d1d4b6ea986d2ad6579a1ec" + "@id": "_:N252928e4ed0f4c6ea83876f7fb2c3d78" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3799,7 +4064,16 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3811,18 +4085,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Human Errors" + "@value": "Something that acts as or causes a compromised account that is then used by the compromiser" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Human Errors" + "@value": "Compromise Account" } ] }, { - "@id": "_:N7d9296887d1d4b6ea986d2ad6579a1ec", + "@id": "_:N252928e4ed0f4c6ea83876f7fb2c3d78", "@type": [ "https://schema.org/WebPage" ], @@ -3838,42 +4112,20 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IllegalDataProcessing", + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N83bd5296b4d94804a73f0e0518c39495" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3885,150 +4137,80 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Illegal Processing of Data" + "@value": "Things that cause or have the potential to impact financial resources" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Illegal Data Processing" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N83bd5296b4d94804a73f0e0518c39495", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Financial Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks", + "@id": "https://w3id.org/dpv/guides", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://www.w3.org/TR/html/" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "accepted" + "@value": "Guides for Data Privacy Vocabulary" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "Concepts associated with risks that arise due to User or Human use" + "@id": "https://w3id.org/dpv/guides" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "User Risks" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PsychologicalHarm", + "@id": "https://w3id.org/dpv/primer", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N903ec696d7504183af4ba63f3f295e8e" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" - } + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@language": "en", - "@value": "accepted" + "@id": "https://www.w3.org/TR/html/" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/format": [ { - "@language": "en", - "@value": "Something that acts as or causes Psychological Harm" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "Psychological Harm" + "@value": "Primer for Data Privacy Vocabulary" } - ] - }, - { - "@id": "_:N903ec696d7504183af4ba63f3f295e8e", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@id": "https://w3id.org/dpv/primer" } ], - "https://schema.org/url": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccount", + "@id": "https://w3id.org/dpv/risk/owl#Blackmail", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -4053,7 +4235,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N2ad682e6dc844471903bc2f55f3eaae7" + "@id": "_:N72e00e4999f548eb88bf909311860524" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4063,7 +4245,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4075,34 +4260,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes a compromised account that is then used by the compromiser" + "@value": "Something that acts as or causes Blackmail" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account" + "@value": "Blackmail" } ] }, { - "@id": "_:N2ad682e6dc844471903bc2f55f3eaae7", + "@id": "_:N72e00e4999f548eb88bf909311860524", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Payment", + "@id": "https://w3id.org/dpv/risk/owl#Benefit", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -4110,13 +4295,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-03-23" } ], "http://purl.org/dc/terms/modified": [ @@ -4144,49 +4329,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources" + "@value": "Something that acts as or causes benefits" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Payment" - } - ] - }, - { - "@id": "https://w3id.org/dpv/primer", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Primer for Data Privacy Vocabulary" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/primer" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@value": "Benefit" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccountCredentials", + "@id": "https://w3id.org/dpv/risk/owl#DenialServiceAttack", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -4211,7 +4365,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nf877665a169e4a7eac29964fc15db245" + "@id": "_:N8705162a41ca472c9e3867ec5902de25" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4221,7 +4375,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4233,56 +4390,39 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Account Credentials to be compromised" + "@value": "Something that acts as or causes Denial of Service Attack (DoS)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account Credentials" + "@value": "Denial of Service Attack (DoS)" } ] }, { - "@id": "_:Nf877665a169e4a7eac29964fc15db245", + "@id": "_:N8705162a41ca472c9e3867ec5902de25", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Damage", + "@id": "https://w3id.org/dpv/risk/owl#ComponentFailure", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -4290,7 +4430,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4302,13 +4445,19 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Damage" + "@value": "Something that acts as or causes Component Failure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Damage" + "@value": "Component Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of" } ] }, @@ -4349,243 +4498,95 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#", + "@id": "https://w3id.org/dpv/risk/owl#EquipmentFailure", "@type": [ - "http://www.w3.org/ns/dx/prof/Profile", - "http://www.w3.org/2002/07/owl#Ontology" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/bibliographicCitation": [ - { - "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" - } - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@value": "http://www.w3.org/2004/02/skos/core" - }, - { - "@id": "http://www.w3.org/2002/07/owl" - }, - { - "@value": "http://www.w3.org/2000/01/rdf-schema" - } - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Axel Polleres" - }, - { - "@value": "Julian Flake" - }, - { - "@value": "Fajar Ekaputra" - }, - { - "@value": "Beatriz Esteves" - }, - { - "@value": "Delaram Golpayegani" - }, - { - "@value": "Georg P. Krog" - }, + "http://purl.org/dc/terms/contributor": [ { "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "2022-08-14" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/creator": [ - { - "@language": "en", - "@value": "Delaram Golpayegani" - }, - { - "@language": "en", - "@value": "Beatriz Esteves" - }, - { - "@language": "en", - "@value": "Julian Flake" - }, - { - "@language": "en", - "@value": "Rob Brennan" - }, - { - "@language": "en", - "@value": "Harshvardhan J. Pandit" - }, - { - "@language": "en", - "@value": "Paul Ryan" - }, + "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "Georg P. Krog" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/description": [ + "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" + "@id": "_:N8e86fbf714a04b25a51dfcacec1cb10e" } ], - "http://purl.org/dc/terms/hasVersion": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/identifier": [ - { - "@value": "https://w3id.org/dpv/risk" - } - ], - "http://purl.org/dc/terms/issued": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@language": "en", - "@value": "2022-08-14" - } - ], - "http://purl.org/dc/terms/license": [ + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + }, { - "@id": "https://www.w3.org/copyright/document-license-2023/" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "2024-07-13" - } - ], - "http://purl.org/dc/terms/publisher": [ - { - "@id": "https://www.w3.org/" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "https://www.w3.org/groups/cg/dpvcg/" + "@value": "accepted" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Concepts" - } - ], - "http://purl.org/ontology/bibo/doi": [ - { - "@value": "10.5281/zenodo.12505841" - } - ], - "http://purl.org/ontology/bibo/status": [ - { - "@value": "http://purl.org/ontology/bibo/status/published" - } - ], - "http://purl.org/vocab/vann/preferredNamespacePrefix": [ - { - "@value": "risk" - } - ], - "http://purl.org/vocab/vann/preferredNamespaceUri": [ - { - "@value": "https://w3id.org/dpv/risk#" + "@value": "Something that acts as or causes Equipment Failure" } ], - "http://www.w3.org/2000/01/rdf-schema#Label": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "RISK" - } - ], - "http://www.w3.org/2002/07/owl#versionIRI": [ - { - "@id": "https://w3id.org/dpv/2.1-dev/risk/owl#" - } - ], - "http://www.w3.org/2002/07/owl#versionInfo": [ - { - "@value": "2.1-dev" - } - ], - "http://www.w3.org/ns/dx/prof/hasResource": [ - { - "@id": "https://w3id.org/dpv/guides" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-html" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3" - }, - { - "@id": "https://w3id.org/dpv/examples" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl" - }, - { - "@id": "https://w3id.org/dpv/primer" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf" + "@value": "Equipment Failure" } ], - "http://www.w3.org/ns/dx/prof/isProfileOf": [ - { - "@id": "http://www.w3.org/2002/07/owl" - }, - { - "@id": "https://w3id.org/dpv/owl" - }, + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@language": "en", + "@value": "Here equipment refers to physical equipment" } + ] + }, + { + "@id": "_:N8e86fbf714a04b25a51dfcacec1cb10e", + "@type": [ + "https://schema.org/WebPage" ], - "http://xmlns.com/foaf/0.1/logo": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/media/logo.png" + "@value": "ISO/IEC 27005:2018" } ], - "https://schema.org/version": [ + "https://schema.org/url": [ { - "@value": "2.1-dev" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Compensation", + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -4593,7 +4594,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4605,127 +4606,39 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms" + "@value": "Risks and issues that arise during operational processes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compensation" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-html", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - HTML serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk-owl.html" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/specification" + "@value": "Operational Security Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VulnerabilityCreated", + "@id": "https://w3id.org/dpv/risk/owl#RightsExercisePrevention", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://purl.org/dc/terms/modified": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nc0018c079b6b42619d869b3ae63ec70a" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#InternalSecurityThreat" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Vulnerability Created" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Vulnerability Created" - } - ] - }, - { - "@id": "_:Nc0018c079b6b42619d869b3ae63ec70a", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "2024-08-16" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ComponentFailure", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -4734,7 +4647,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4746,24 +4659,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Component Failure" + "@value": "Something that acts as or causes Prevent Exercising of Rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Component Failure" + "@value": "Prevent Exercising of Rights" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of" + "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IdentityTheft", + "@id": "https://w3id.org/dpv/risk/owl#Spoofing", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -4788,7 +4701,10 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nad476399871e41a5bd37e1133df27770" + "@id": "_:N0085b3ac0b474cf1a64eccdff3718c8d" + }, + { + "@id": "_:N539160303302464aa341bdfa53068f22" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4799,6 +4715,15 @@ "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4810,60 +4735,54 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Identity Theft" + "@value": "Something that acts as or causes Spoofing" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identity Theft" + "@value": "Spoofing" } ] }, { - "@id": "_:Nad476399871e41a5bd37e1133df27770", + "@id": "_:N0085b3ac0b474cf1a64eccdff3718c8d", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnwantedCodeDeletion", + "@id": "_:N539160303302464aa341bdfa53068f22", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/modified": [ + "https://schema.org/name": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/source": [ + "https://schema.org/url": [ { - "@id": "_:Nef681cfae64c43969ff8ef7fdde7753a" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -4872,7 +4791,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4884,34 +4803,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Code Deletion" + "@value": "Risks and issues that have their basis in legal requirements and enforcement" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Code Deletion" - } - ] - }, - { - "@id": "_:Nef681cfae64c43969ff8ef7fdde7753a", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "Legal Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingCodeOfConduct", + "@id": "https://w3id.org/dpv/risk/owl#Fraud", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -4936,7 +4839,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N3d2e8d97024142dca7a47b73cbb8097c" + "@id": "_:N0328e4baf7504ceb93cd9bbab8b23099" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4946,36 +4849,33 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Code of Conduct" + "@value": "Something that acts as or causes Fraud" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Code of Conduct" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0" + "@value": "Fraud" } ] }, { - "@id": "_:N3d2e8d97024142dca7a47b73cbb8097c", + "@id": "_:N0328e4baf7504ceb93cd9bbab8b23099", "@type": [ "https://schema.org/WebPage" ], @@ -4991,34 +4891,12 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseTrust", + "@id": "https://w3id.org/dpv/risk/owl#Privacy", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nbb93cef662444084828d04948d35895d" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -5026,7 +4904,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5035,37 +4913,15 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Loss of Trust" - } - ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Trust" - } - ] - }, - { - "@id": "_:Nbb93cef662444084828d04948d35895d", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Privacy" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#InterceptCommunications", + "@id": "https://w3id.org/dpv/risk/owl#Cryptojacking", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -5090,7 +4946,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N9ba04625c759479eba79e0016163e8e6" + "@id": "_:N3adf839933da482c89a2828fc9743969" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5099,6 +4955,9 @@ } ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, { "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } @@ -5106,73 +4965,45 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Interception of Communications" + "@value": "Something that acts as or causes Cryptojacking" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Intercept Communications" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0" + "@value": "Cryptojacking" } ] }, { - "@id": "_:N9ba04625c759479eba79e0016163e8e6", + "@id": "_:N3adf839933da482c89a2828fc9743969", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Landscape 2021" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingLegalObligation", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingPolicy", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Naf3bb0ebde894641a8c0a69545e7f6cc" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -5186,46 +5017,24 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Legal Obligations" + "@value": "Something that acts as or causes violation of policy which can be either internal or external policy" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Legal Obligations" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0" - } - ] - }, - { - "@id": "_:Naf3bb0ebde894641a8c0a69545e7f6cc", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Violating Policy" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SocialDisadvantage", + "@id": "https://w3id.org/dpv/risk/owl#LoseCustomerConfidence", "@type": [ "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -5233,13 +5042,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -5248,6 +5057,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N669b51dd9b0f4a71983f16dfc274956a" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -5255,7 +5069,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5267,21 +5081,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Social Disadvantage" + "@value": "Something that acts as or causes Loss of Customer Confidence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@language": "en", - "@value": "Social Disadvantage" + "@language": "en", + "@value": "Lose of Customer Confidence" + } + ] + }, + { + "@id": "_:N669b51dd9b0f4a71983f16dfc274956a", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingEthicsCode", + "@id": "https://w3id.org/dpv/risk/owl#PsychologicalHarm", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5303,7 +5133,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd8ddc1f8024a4418b62c344837cff0cd" + "@id": "_:N0ddf524630684b719d7f03f907c20cff" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5313,57 +5143,78 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Ethics Code" + "@value": "Something that acts as or causes Psychological Harm" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Ethics Code" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0" + "@value": "Psychological Harm" } ] }, { - "@id": "_:Nd8ddc1f8024a4418b62c344837cff0cd", + "@id": "_:N0ddf524630684b719d7f03f907c20cff", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseCustomerConfidence", + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityBreach", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#DataBreach" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeModification", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], "http://purl.org/dc/terms/contributor": [ { "@value": "Harshvardhan J. Pandit" @@ -5383,7 +5234,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0d138f94265e46f293490fbe0fc8074c" + "@id": "_:Ncecbd81981b3460f9cede6031d4ab8b1" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5393,7 +5244,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5405,37 +5259,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Customer Confidence" + "@value": "Something that acts as or causes Unauthorised Code Modification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Customer Confidence" + "@value": "Unauthorised Code Modification" } ] }, { - "@id": "_:N0d138f94265e46f293490fbe0fc8074c", + "@id": "_:Ncecbd81981b3460f9cede6031d4ab8b1", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RightsImpact", + "@id": "https://w3id.org/dpv/risk/owl#ViolenceAgainstChildren", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5457,7 +5311,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N4e0b95db2d414e7588f607d2edf6902e" + "@id": "_:N50def33314ee4442bf7e77161e51165b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5467,10 +5321,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Impact" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5482,40 +5333,40 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Impact to Rights" + "@value": "Something that acts as or causes Child Violence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Impact to Rights" + "@value": "Violence against children" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"ImpactToRights\" in DPV 2.0" + "@value": "This concept was called \"ChildViolence\" in DPV 2.0" } ] }, { - "@id": "_:N4e0b95db2d414e7588f607d2edf6902e", + "@id": "_:N50def33314ee4442bf7e77161e51165b", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeAccess", + "@id": "https://w3id.org/dpv/risk/owl#UnwantedCodeDeletion", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -5540,7 +5391,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N8193907d23bd43dc8b146573989b8a0d" + "@id": "_:N9b03e23aa8864f4288a1885778e3b1e4" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5551,6 +5402,12 @@ "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5562,18 +5419,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Access" + "@value": "Something that acts as or causes Unwanted Code Deletion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Access" + "@value": "Unwanted Code Deletion" } ] }, { - "@id": "_:N8193907d23bd43dc8b146573989b8a0d", + "@id": "_:N9b03e23aa8864f4288a1885778e3b1e4", "@type": [ "https://schema.org/WebPage" ], @@ -5589,7 +5446,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExposureToHarmfulSpeech", + "@id": "https://w3id.org/dpv/risk/owl#CopyrightViolation", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -5614,7 +5471,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ne595b225e5ee4cc2b2374256ef05fa2e" + "@id": "_:N3984b17b1694455793b94c3ad850178d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5624,7 +5481,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5636,24 +5493,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Harmful Speech" + "@value": "Something that acts as or causes Copyright Violation" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Exposure to Harmful Speech" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0" + "@value": "Copyright Violation" } ] }, { - "@id": "_:Ne595b225e5ee4cc2b2374256ef05fa2e", + "@id": "_:N3984b17b1694455793b94c3ad850178d", "@type": [ "https://schema.org/WebPage" ], @@ -5669,10 +5520,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#EquipmentMalfunction", + "@id": "https://w3id.org/dpv/risk/owl#Scam", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5694,7 +5545,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N7f1dc230141c4448a99f28f362191020" + "@id": "_:Nea270aca30b44f5a8cfda049ee8bf631" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5704,7 +5555,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5716,24 +5570,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Equipment Malfunction" + "@value": "Something that acts as or causes Scam" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Equipment Malfunction" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here equipment refers to physical equipment" + "@value": "Scam" } ] }, { - "@id": "_:N7f1dc230141c4448a99f28f362191020", + "@id": "_:Nea270aca30b44f5a8cfda049ee8bf631", "@type": [ "https://schema.org/WebPage" ], @@ -5749,10 +5597,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataAccess", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemModification", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5774,7 +5622,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nc799e152712d4ee48d59c2a1366fca7f" + "@id": "_:N029a97b214024c18a899586cb3864d2a" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5783,6 +5631,9 @@ } ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, { "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } @@ -5796,34 +5647,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Access" + "@value": "Something that acts as or causes Unauthorised System Modification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Access" + "@value": "Unauthorised System Modification" } ] }, { - "@id": "_:Nc799e152712d4ee48d59c2a1366fca7f", + "@id": "_:N029a97b214024c18a899586cb3864d2a", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseGoodwill", + "@id": "https://w3id.org/dpv/risk/owl#Injury", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -5848,7 +5699,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N4f8237833a8141b2bb3c31cf5176bf42" + "@id": "_:Na6c5e17bb8ac4135b62412f66dd88460" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5858,7 +5709,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5870,18 +5721,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Goodwill" + "@value": "Something that acts as or causes Injury" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Goodwill" + "@value": "Injury" } ] }, { - "@id": "_:N4f8237833a8141b2bb3c31cf5176bf42", + "@id": "_:Na6c5e17bb8ac4135b62412f66dd88460", "@type": [ "https://schema.org/WebPage" ], @@ -5897,7 +5748,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Reward", + "@id": "https://w3id.org/dpv/risk/owl#PhysicalAssault", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -5905,13 +5756,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -5920,6 +5771,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6b8cf1ee50ba4ea081a101b53baf3bb3" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -5927,7 +5783,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5939,42 +5795,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee" + "@value": "Something that acts as or causes Physical Assault" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reward" + "@value": "Physical Assault" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityBreach", + "@id": "_:N6b8cf1ee50ba4ea081a101b53baf3bb3", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk/owl#DataBreach" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "accepted" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Benefit", + "@id": "https://w3id.org/dpv/risk/owl#PublicOrderBreach", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -5982,13 +5830,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -5997,6 +5845,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N1d102af8ecd94ce3a875a9a2a7e78bcc" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -6004,7 +5857,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6016,21 +5869,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes benefits" + "@value": "Something that acts as or causes Public Order Breach" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Benefit" + "@value": "Public Order Breach" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SexualViolence", + "@id": "_:N1d102af8ecd94ce3a875a9a2a7e78bcc", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Sabotage", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6052,7 +5921,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nbeddee22b7a841e39879764ab63949f8" + "@id": "_:N2fc72d8ce45943bcaad06c0a96aac629" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6062,7 +5931,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6074,18 +5949,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Sexual Violence" + "@value": "Something that acts as or causes Sabotage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sexual Violence" + "@value": "Sabotage" } ] }, { - "@id": "_:Nbeddee22b7a841e39879764ab63949f8", + "@id": "_:N2fc72d8ce45943bcaad06c0a96aac629", "@type": [ "https://schema.org/WebPage" ], @@ -6101,7 +5976,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseReputation", + "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccountCredentials", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -6126,7 +6001,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0282f3114f5b4278b632620b9b954c7d" + "@id": "_:N1005943ded74408ea68c811475686000" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6136,7 +6011,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6148,39 +6026,56 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Reputation" + "@value": "Something that acts as or causes Account Credentials to be compromised" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Reputation" + "@value": "Compromise Account Credentials" } ] }, { - "@id": "_:N0282f3114f5b4278b632620b9b954c7d", + "@id": "_:N1005943ded74408ea68c811475686000", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AccidentalMisuse", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedReidentification", "@type": [ "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-19" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -6188,7 +6083,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6200,18 +6098,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Accidental Misuse" + "@value": "Something that acts as or causes Unauthorised Re-Identification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Accidental Misuse" + "@value": "Unauthorised Re-Identification" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Spoofing", + "@id": "https://w3id.org/dpv/risk/owl#ErroneousSystemUse", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -6236,10 +6134,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N603a4b8fadf24d23ac9c224927644c9d" - }, - { - "@id": "_:N698cebdfba864777b23d25052c4d2493" + "@id": "_:N258e312c37aa4354bed73603ef7a36f6" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6249,10 +6144,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6264,34 +6156,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Spoofing" + "@value": "Something that acts as or causes Erroneous System Use" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Spoofing" - } - ] - }, - { - "@id": "_:N603a4b8fadf24d23ac9c224927644c9d", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Erroneous System Use" } ] }, { - "@id": "_:N698cebdfba864777b23d25052c4d2493", + "@id": "_:N258e312c37aa4354bed73603ef7a36f6", "@type": [ "https://schema.org/WebPage" ], @@ -6307,10 +6183,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MaterialDamage", + "@id": "https://w3id.org/dpv/risk/owl#SystemFailure", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6321,7 +6197,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -6330,6 +6206,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nd794c9a0064e4fe6bb3a0ebd38859b9b" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -6337,7 +6218,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6349,53 +6233,44 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Material Damage" + "@value": "Something that acts as or causes System Failure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Material Damage" + "@value": "System Failure" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" + "@value": "Here system refers to both hardware and software systems" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DenialServiceAttack", + "@id": "_:Nd794c9a0064e4fe6bb3a0ebd38859b9b", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/modified": [ + "https://schema.org/name": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nf82ac345e0fe44a394f7da0ec78ef801" - }, + "https://schema.org/url": [ { - "@id": "_:N51a29309d655420e8611a50e7d2baa7c" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -6403,8 +6278,17 @@ } ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, { "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6416,54 +6300,39 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Denial of Service Attack (DoS)" + "@value": "Something that acts as or causes Unauthorised Activity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Denial of Service Attack (DoS)" + "@value": "Unauthorised Activity" } ] }, { - "@id": "_:Nf82ac345e0fe44a394f7da0ec78ef801", + "@id": "https://w3id.org/dpv/risk/owl#Payment", "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } - ] - }, - { - "@id": "_:N51a29309d655420e8611a50e7d2baa7c", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/created": [ { - "@value": "ISO/IEC 27005:2018" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-04-14" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack", - "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -6472,7 +6341,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6484,21 +6353,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes an attack on security with the aim of undermining it" + "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Security Attack" + "@value": "Payment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseCredibility", + "@id": "https://w3id.org/dpv/risk/owl#ExposureToHarmfulSpeech", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6520,7 +6389,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N347037135ba54cefae0a2a69a47e52d9" + "@id": "_:N95f46ba999c74717949420ed05a75570" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6530,7 +6399,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6542,68 +6411,43 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Credibility" + "@value": "Something that acts as or causes Harmful Speech" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Credibility" - } - ] - }, - { - "@id": "_:N347037135ba54cefae0a2a69a47e52d9", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Exposure to Harmful Speech" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf", + "@id": "_:N95f46ba999c74717949420ed05a75570", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - RDF/XML serialiation" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.rdf" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "https://schema.org/url": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#FinancialLoss", + "@id": "https://w3id.org/dpv/risk/owl#MaliciousCodeAttack", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6625,7 +6469,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0296c48d481641d492572a05652b6bf5" + "@id": "_:N625dc3c061c74eec9f96d171c60fd3c0" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6635,7 +6479,16 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6647,37 +6500,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity" + "@value": "Something that acts as or causes Malicious Code Attack" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Loss" + "@value": "Malicious Code Attack" } ] }, { - "@id": "_:N0296c48d481641d492572a05652b6bf5", + "@id": "_:N625dc3c061c74eec9f96d171c60fd3c0", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemAccess", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6688,7 +6541,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -6697,6 +6550,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6fdf74981d95420a82b9c97acf9aa9eb" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -6704,7 +6562,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6716,24 +6580,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Non-Material Damage" + "@value": "Something that acts as or causes Unauthorised System Access" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Non-Material Damage" + "@value": "Unauthorised System Access" } + ] + }, + { + "@id": "_:N6fdf74981d95420a82b9c97acf9aa9eb", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeDisclosure", + "@id": "https://w3id.org/dpv/risk/owl#BruteForceAuthorisations", "@type": [ "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -6758,7 +6632,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N540e39aa17014568ba5a2b03534c1f19" + "@id": "_:Nb75b090fdcda4ec38e841680681bf642" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6767,8 +6641,14 @@ } ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, { "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6780,39 +6660,56 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Disclosure" + "@value": "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Disclosure" + "@value": "Brute Force Authorisations" } ] }, { - "@id": "_:N540e39aa17014568ba5a2b03534c1f19", + "@id": "_:Nb75b090fdcda4ec38e841680681bf642", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#EnvironmentalRisk", + "@id": "https://w3id.org/dpv/risk/owl#Compensation", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-04-14" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -6820,7 +6717,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6832,18 +6729,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that have their origin in environment or can affect the environment at large" + "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Environmental Risk" + "@value": "Compensation" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Discrimination", + "@id": "https://w3id.org/dpv/risk/owl#RightsLimitation", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -6851,13 +6748,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-08-18" } ], "http://purl.org/dc/terms/modified": [ @@ -6885,23 +6782,51 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Discrimination" + "@value": "Something that acts as or causes Limitation of Rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Discrimination" + "@value": "Limitation of Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk", + "@id": "https://w3id.org/dpv/risk/owl#IdentityFraud", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nc74530c53d534886a66e5a7f741398bb" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -6909,7 +6834,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6921,18 +6849,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that affect the reputation of the organisation" + "@value": "Something that acts as or causes Identity Fraud" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reputational Risk" + "@value": "Identity Fraud" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeModification", + "@id": "_:Nc74530c53d534886a66e5a7f741398bb", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Threat Taxonomy 2016" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Reward", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -6940,13 +6884,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], "http://purl.org/dc/terms/modified": [ @@ -6955,11 +6899,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N8ae12eb2b96a4c7e97a8739ee00ffe80" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -6967,7 +6906,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6979,37 +6918,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Modification" + "@value": "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Modification" - } - ] - }, - { - "@id": "_:N8ae12eb2b96a4c7e97a8739ee00ffe80", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "Reward" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolenceAgainstChildren", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataModification", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -7031,7 +6954,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb34535276ddd4a56ac18dcc8fc489cbb" + "@id": "_:Nb76ee4ad00614561b02ea8b1fd3da77c" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7041,7 +6964,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7053,24 +6979,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Child Violence" + "@value": "Something that acts as or causes Unauthorised Data Modification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violence against children" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ChildViolence\" in DPV 2.0" + "@value": "Unauthorised Data Modification" } ] }, { - "@id": "_:Nb34535276ddd4a56ac18dcc8fc489cbb", + "@id": "_:Nb76ee4ad00614561b02ea8b1fd3da77c", "@type": [ "https://schema.org/WebPage" ], @@ -7086,7 +7006,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Terrorism", + "@id": "https://w3id.org/dpv/risk/owl#DataBreach", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -7111,7 +7031,15 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nf6a25073f9274363bcb649fe8540fc70" + "@id": "_:N0353966748ad43cc9b9c03081ec6b6f9" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples/owl#E0071" + }, + { + "@id": "https://w3id.org/dpv/examples/owl#E0069" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7121,7 +7049,16 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7133,18 +7070,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Terrorism" + "@value": "Something that acts as or causes Data Breach" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Terrorism" + "@value": "Data Breach" } ] }, { - "@id": "_:Nf6a25073f9274363bcb649fe8540fc70", + "@id": "_:N0353966748ad43cc9b9c03081ec6b6f9", "@type": [ "https://schema.org/WebPage" ], @@ -7160,7 +7097,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PersonalSafetyEndangerment", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataAccess", "@type": [ "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -7185,7 +7122,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Na66b6d002d3f448981a58870da1a686e" + "@id": "_:N0eacc049940646a99623da2cd6a2d394" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7195,7 +7132,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7207,34 +7147,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Personal Safety Endangerment" + "@value": "Something that acts as or causes Unauthorised Data Access" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Personal Safety Endangerment" + "@value": "Unauthorised Data Access" } ] }, { - "@id": "_:Na66b6d002d3f448981a58870da1a686e", + "@id": "_:N0eacc049940646a99623da2cd6a2d394", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RightsViolation", + "@id": "https://w3id.org/dpv/risk/owl#UnwantedDataDeletion", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -7242,13 +7182,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -7257,6 +7197,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nde382e9a51c445d69476b298827b1cbe" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -7264,7 +7209,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7276,60 +7227,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Rights" + "@value": "Something that acts as or causes Unwanted Data Deletion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0" + "@value": "Unwanted Data Deletion" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk", + "@id": "_:Nde382e9a51c445d69476b298827b1cbe", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/owl#RiskConcept" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "Risks and issues that have their basis in legal requirements and enforcement" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Legal Risk" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingPolicy", + "@id": "https://w3id.org/dpv/risk/owl#IntentionalMisuse", "@type": [ "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -7342,7 +7267,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7354,21 +7279,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes violation of policy which can be either internal or external policy" + "@value": "Intentional Misuse" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Policy" + "@value": "Intentional Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingContractualObligation", + "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -7379,7 +7304,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-30" } ], "http://purl.org/dc/terms/modified": [ @@ -7388,11 +7313,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N1802c2900f5b4c578896c91c3149381d" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -7406,60 +7326,80 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Contractual Obligations" + "@value": "Something that acts as or causes Non-Material Damage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Contractual Obligation" + "@value": "Non-Material Damage" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0" + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" } ] }, { - "@id": "_:N1802c2900f5b4c578896c91c3149381d", + "@id": "https://w3id.org/dpv/risk/owl#JudicialPenalty", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that involves or causes judicial penalties to be paid" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Judicial Penalty" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Misuse", + "@id": "https://w3id.org/dpv/risk/owl#Detriment", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Delaram Golpayegani" + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-06-11" + "@value": "2022-03-23" } ], "http://purl.org/dc/terms/modified": [ @@ -7475,7 +7415,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7487,18 +7427,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Misuse" + "@value": "Something that acts as or causes Detriment" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Misuse" + "@value": "Detriment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DistributedDenialServiceAttack", + "@id": "https://w3id.org/dpv/risk/owl#LoseCredibility", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -7523,7 +7463,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N842f6dd3b92c482180f56ce6a495c382" + "@id": "_:N2c068c379d9b4c2b8da0937ad8be6a81" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7533,7 +7473,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7545,18 +7485,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Distributed Denial of Service Attack (DDoS)" + "@value": "Something that acts as or causes Loss of Credibility" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Distributed Denial of Service Attack (DDoS)" + "@value": "Lose of Credibility" } ] }, { - "@id": "_:N842f6dd3b92c482180f56ce6a495c382", + "@id": "_:N2c068c379d9b4c2b8da0937ad8be6a81", "@type": [ "https://schema.org/WebPage" ], @@ -7572,7 +7512,38 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataModification", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-html", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - HTML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.html" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/specification" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeAccess", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -7597,7 +7568,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Naa83e8f3fb5e4e9a88398292112d68f3" + "@id": "_:N99568e0cd3774d348d85262f04bc3a0b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7606,6 +7577,12 @@ } ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, { "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } @@ -7619,29 +7596,56 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Modification" + "@value": "Something that acts as or causes Unauthorised Code Access" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Modification" + "@value": "Unauthorised Code Access" } ] }, { - "@id": "_:Naa83e8f3fb5e4e9a88398292112d68f3", + "@id": "_:N99568e0cd3774d348d85262f04bc3a0b", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityBreach", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#DataBreach" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" } ] }, @@ -7676,7 +7680,43 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Reidentification", + "@id": "https://w3id.org/dpv/risk/owl#UserRisks", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/owl#RiskConcept" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concepts associated with risks that arise due to User or Human use" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "User Risks" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#LoseNegotiatingCapacity", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -7690,7 +7730,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -7699,6 +7739,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nf8d97cf300cf44d5881be9535d0b1dff" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -7706,7 +7751,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7718,29 +7763,61 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Re-identification" + "@value": "Something that acts as or causes Loss of Negotiating Capacity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Re-identification" + "@value": "Lose of Negotiating Capacity" + } + ] + }, + { + "@id": "_:Nf8d97cf300cf44d5881be9535d0b1dff", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#InternalSecurityThreat", + "@id": "https://w3id.org/dpv/risk/owl#InterceptCommunications", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N1f36b972c50f49fb9b474152b57cf474" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -7748,25 +7825,50 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Concepts associated with security threats and issues that originate within the organisation" + "@value": "Something that acts as or causes Interception of Communications" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Internal Security Threat" + "@value": "Intercept Communications" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0" + } + ] + }, + { + "@id": "_:N1f36b972c50f49fb9b474152b57cf474", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" } ] } diff --git a/2.1-dev/risk/modules/risk_consequences-owl.n3 b/2.1-dev/risk/modules/risk_consequences-owl.n3 index 100050053..1fdb2d194 100644 --- a/2.1-dev/risk/modules/risk_consequences-owl.n3 +++ b/2.1-dev/risk/modules/risk_consequences-owl.n3 @@ -34,7 +34,9 @@ risk-owl:AuthorisationFailure a rdfs:Class, schema:name "ENISa Trust Services Security Incidents 2021" ; schema:url "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Authorisation Failure"@en ; skos:prefLabel "Authorisation Failure"@en . @@ -43,7 +45,8 @@ risk-owl:AvailabilityBreach a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:DataBreach ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:DataBreach ; sw:term_status "accepted"@en . risk-owl:Benefit a rdfs:Class, @@ -68,7 +71,8 @@ risk-owl:Blackmail a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Blackmail"@en ; skos:prefLabel "Blackmail"@en . @@ -83,7 +87,9 @@ risk-owl:BruteForceAuthorisations a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; skos:prefLabel "Brute Force Authorisations"@en . @@ -98,7 +104,8 @@ risk-owl:Coercion a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Coercion"@en ; skos:prefLabel "Coercion"@en . @@ -119,7 +126,8 @@ risk-owl:ComponentFailure a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Component Failure"@en ; skos:prefLabel "Component Failure"@en ; @@ -129,7 +137,8 @@ risk-owl:ComponentMalfunction a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Component Malfunction"@en ; skos:prefLabel "Component Malfunction"@en ; @@ -145,7 +154,10 @@ risk-owl:CompromiseAccount a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ; skos:prefLabel "Compromise Account"@en . @@ -160,7 +172,8 @@ risk-owl:CompromiseAccountCredentials a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ; skos:prefLabel "Compromise Account Credentials"@en . @@ -175,7 +188,8 @@ risk-owl:ConfidentialityBreach a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:DataBreach ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:DataBreach ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Confidentiality Breach"@en ; skos:prefLabel "Confidentiality Breach"@en . @@ -205,7 +219,8 @@ risk-owl:Cryptojacking a rdfs:Class, schema:name "ENISA Threat Landscape 2021" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Cryptojacking"@en ; skos:prefLabel "Cryptojacking"@en . @@ -234,7 +249,10 @@ risk-owl:DataBreach a rdfs:Class, vann:example dex-owl:E0069, dex-owl:E0071 ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SecurityBreach ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:SecurityBreach ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Data Breach"@en ; skos:prefLabel "Data Breach"@en . @@ -249,7 +267,8 @@ risk-owl:DataCorruption a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:IntegrityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Corruption of Data"@en ; skos:prefLabel "Data Corruption"@en ; @@ -262,13 +281,11 @@ risk-owl:DenialServiceAttack a rdfs:Class, dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ], - [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ; skos:prefLabel "Denial of Service Attack (DoS)"@en . @@ -307,7 +324,8 @@ risk-owl:DistributedDenialServiceAttack a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ; skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en . @@ -331,7 +349,8 @@ risk-owl:EquipmentFailure a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Equipment Failure"@en ; skos:prefLabel "Equipment Failure"@en ; @@ -347,7 +366,8 @@ risk-owl:EquipmentMalfunction a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Equipment Malfunction"@en ; skos:prefLabel "Equipment Malfunction"@en ; @@ -403,7 +423,8 @@ risk-owl:Extorsion a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Extorsion"@en ; skos:prefLabel "Extorsion"@en . @@ -455,7 +476,8 @@ risk-owl:Fraud a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Fraud"@en ; skos:prefLabel "Fraud"@en . @@ -498,7 +520,8 @@ risk-owl:IdentityFraud a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Identity Fraud"@en ; skos:prefLabel "Identity Fraud"@en . @@ -513,7 +536,8 @@ risk-owl:IdentityTheft a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Identity Theft"@en ; skos:prefLabel "Identity Theft"@en . @@ -568,7 +592,8 @@ risk-owl:IntegrityBreach a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:DataBreach ; + rdfs:subClassOf risk-owl:DataBreach, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en . risk-owl:IntentionalMisuse a rdfs:Class, @@ -590,21 +615,13 @@ risk-owl:InterceptCommunications a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Interception of Communications"@en ; skos:prefLabel "Intercept Communications"@en ; skos:scopeNote "This concept was called \"InterceptionCommunications\" in DPV 2.0"@en . -risk-owl:InternalSecurityThreat a rdfs:Class, - owl:Class, - dpv-owl:RiskConcept ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:RiskConcept ; - sw:term_status "accepted"@en ; - skos:definition "Concepts associated with security threats and issues that originate within the organisation"@en ; - skos:prefLabel "Internal Security Threat"@en . - risk-owl:JudicialCosts a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; @@ -747,7 +764,10 @@ risk-owl:MaliciousCodeAttack a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Malicious Code Attack"@en ; skos:prefLabel "Malicious Code Attack"@en . @@ -762,7 +782,10 @@ risk-owl:MalwareAttack a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Malware Attack"@en ; skos:prefLabel "Malware Attack"@en . @@ -851,7 +874,8 @@ risk-owl:PhishingScam a rdfs:Class, schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Phishing Scam"@en ; skos:prefLabel "Phishing Scam"@en . @@ -924,7 +948,8 @@ risk-owl:Reidentification a rdfs:Class, dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Re-identification"@en ; skos:prefLabel "Re-identification"@en ; @@ -1029,7 +1054,9 @@ risk-owl:Sabotage a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Sabotage"@en ; skos:prefLabel "Sabotage"@en . @@ -1044,7 +1071,8 @@ risk-owl:Scam a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Scam"@en ; skos:prefLabel "Scam"@en . @@ -1053,7 +1081,10 @@ risk-owl:SecurityAttack a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ; skos:prefLabel "Security Attack"@en . @@ -1068,7 +1099,10 @@ risk-owl:SecurityBreach a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Security Breach"@en ; skos:prefLabel "Security Breach"@en . @@ -1130,7 +1164,9 @@ risk-owl:Spoofing a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat, + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept, risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Spoofing"@en ; @@ -1146,7 +1182,8 @@ risk-owl:SystemFailure a rdfs:Class, schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes System Failure"@en ; skos:prefLabel "System Failure"@en ; @@ -1162,7 +1199,10 @@ risk-owl:SystemIntrusion a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes System Intrusion"@en ; skos:prefLabel "System Intrusion"@en . @@ -1177,7 +1217,8 @@ risk-owl:SystemMalfunction a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes System Malfunction"@en ; skos:prefLabel "System Malfunction"@en ; @@ -1208,7 +1249,10 @@ risk-owl:UnauthorisedAccesstoPremises a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ; skos:prefLabel "Unauthorised Access to Premises"@en . @@ -1217,7 +1261,10 @@ risk-owl:UnauthorisedActivity a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Activity"@en ; skos:prefLabel "Unauthorised Activity"@en . @@ -1232,7 +1279,9 @@ risk-owl:UnauthorisedCodeAccess a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Code Access"@en ; skos:prefLabel "Unauthorised Code Access"@en . @@ -1247,7 +1296,8 @@ risk-owl:UnauthorisedCodeDisclosure a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ; skos:prefLabel "Unauthorised Code Disclosure"@en . @@ -1262,7 +1312,8 @@ risk-owl:UnauthorisedCodeModification a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ; skos:prefLabel "Unauthorised Code Modification"@en . @@ -1277,7 +1328,8 @@ risk-owl:UnauthorisedDataAccess a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Data Access"@en ; skos:prefLabel "Unauthorised Data Access"@en . @@ -1292,7 +1344,8 @@ risk-owl:UnauthorisedDataDisclosure a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ; skos:prefLabel "Unauthorised Data Disclosure"@en . @@ -1307,7 +1360,8 @@ risk-owl:UnauthorisedDataModification a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ; skos:prefLabel "Unauthorised Data Modification"@en . @@ -1322,7 +1376,8 @@ risk-owl:UnauthorisedInformationDisclosure a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ; skos:prefLabel "Unauthorised Information Disclosure"@en . @@ -1334,7 +1389,8 @@ risk-owl:UnauthorisedReidentification a rdfs:Class, dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ; skos:prefLabel "Unauthorised Re-Identification"@en . @@ -1349,7 +1405,8 @@ risk-owl:UnauthorisedResourceUse a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ; skos:prefLabel "Unauthorised Resource Use"@en . @@ -1364,7 +1421,9 @@ risk-owl:UnauthorisedSystemAccess a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised System Access"@en ; skos:prefLabel "Unauthorised System Access"@en . @@ -1379,7 +1438,8 @@ risk-owl:UnauthorisedSystemModification a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised System Modification"@en ; skos:prefLabel "Unauthorised System Modification"@en . @@ -1394,7 +1454,9 @@ risk-owl:UnwantedCodeDeletion a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ; skos:prefLabel "Unwanted Code Deletion"@en . @@ -1409,7 +1471,9 @@ risk-owl:UnwantedDataDeletion a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ; skos:prefLabel "Unwanted Data Deletion"@en . @@ -1424,7 +1488,8 @@ risk-owl:UnwantedDisclosureData a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ; skos:prefLabel "Unwanted Disclosure of Data"@en . @@ -1543,21 +1608,6 @@ risk-owl:ViolenceAgainstChildren a rdfs:Class, skos:prefLabel "Violence against children"@en ; skos:scopeNote "This concept was called \"ChildViolence\" in DPV 2.0"@en . -risk-owl:VulnerabilityCreated a rdfs:Class, - owl:Class, - dpv-owl:RiskConcept ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:modified "2024-08-16"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:InternalSecurityThreat ; - sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Vulnerability Created"@en ; - skos:prefLabel "Vulnerability Created"@en . - risk-owl:serialisation-html a profile:ResourceDescriptor ; dct:conformsTo ; dct:format ; diff --git a/2.1-dev/risk/modules/risk_consequences-owl.rdf b/2.1-dev/risk/modules/risk_consequences-owl.rdf index a24cf3b5f..9c7cdd832 100644 --- a/2.1-dev/risk/modules/risk_consequences-owl.rdf +++ b/2.1-dev/risk/modules/risk_consequences-owl.rdf @@ -12,1997 +12,2039 @@ xmlns:sw="http://www.w3.org/2003/06/sw-vocab-status/ns#" xmlns:vann="http://purl.org/vocab/vann/" > - + + modified + Georg P. Krog, Harshvardhan J. Pandit - modified + Fee + DGA 2.10 + Something that acts as or provides fees e.g. for using a service 2024-08-16 - Something that acts as or causes Violation of Contractual Obligations - - This concept was called "ViolationContractualObligations" in DPV 2.0 - Violation of Contractual Obligation - 2022-08-17 - Harshvardhan J. Pandit - + 2024-04-14 + - + + accepted + 2024-08-16 + Exposure to Harmful Speech - Something that acts as or causes Loss of Negotiating Capacity - - Harshvardhan J. Pandit + This concept was called "HarmfulSpeech" in DPV 2.0 2022-08-17 - accepted - 2024-08-16 - Lose of Negotiating Capacity - + Harshvardhan J. Pandit + Something that acts as or causes Harmful Speech + + - - Compensation - + - 2024-04-14 - Georg P. Krog, Harshvardhan J. Pandit + 2022-08-17 + + + Harshvardhan J. Pandit + Something that acts as or causes Physical Assault accepted - Something that acts as or provides compensation - which can be monetary and financial or in other forms 2024-08-16 - + Physical Assault + - + + 2024-08-16 + Lose of Negotiating Capacity + + + + 2022-08-17 - Harshvardhan J. Pandit - modified + accepted + Something that acts as or causes Loss of Negotiating Capacity + + + + + 2022-08-19 + 2024-08-16 - 2024-08-16 - 2022-08-17 - Something that acts as or causes Corruption of Data - Data Corruption - This concept was called "Corruption Data" in DPV 2.0 + + Harshvardhan J. Pandit + Re-identification + Something that acts as or causes Re-identification + Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification + accepted + - + + + + Something that acts as or causes an attack on security with the aim of undermining it + + accepted + Security Attack + + + + + + + Something that acts as or causes Child Violence + 2024-08-16 + - Public Order Breach - Harshvardhan J. Pandit + Violence against children accepted - 2024-08-16 2022-08-17 - Something that acts as or causes Public Order Breach - + + This concept was called "ChildViolence" in DPV 2.0 + - - Harshvardhan J. Pandit - accepted + + 2024-08-16 - 2024-08-16 2022-08-17 - Something that acts as or causes a compromised account that is then used by the compromiser - Compromise Account + Something that acts as or causes Loss of Goodwill - - + Harshvardhan J. Pandit + + accepted + Lose of Goodwill + - - 2024-08-16 + accepted + Risks and issues that affect the reputation of the organisation - This concept was called "HarmfulSpeech" in DPV 2.0 - 2022-08-17 - Something that acts as or causes Harmful Speech - Exposure to Harmful Speech + Reputational Risk - Harshvardhan J. Pandit - - + - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - Violation of Rights + + accepted + Something that acts as or causes Component Malfunction - Georg P. Krog, Harshvardhan J. Pandit - 2022-08-18 - Something that acts as or causes Violation of Rights - 2024-08-16 - This concept was called "ViolationOfRights" in DPV 2.0 + Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of - accepted - + Component Malfunction + + - - Security Breach + + Something that acts as or causes Unauthorised Data Disclosure + 2024-08-16 - Something that acts as or causes Security Breach - Harshvardhan J. Pandit - 2024-08-16 - accepted 2022-08-17 - - + + + Harshvardhan J. Pandit + Unauthorised Data Disclosure + + - + + Something that acts as or causes Component Failure + Component Failure accepted - + Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of + + - - 2022-08-17 - Violating Code of Conduct - + - modified + Here equipment refers to physical equipment + Something that acts as or causes Equipment Failure 2024-08-16 + 2022-08-17 + Harshvardhan J. Pandit - Something that acts as or causes Violation of Code of Conduct - - This concept was called "ViolationCodeConduct" in DPV 2.0 - + Equipment Failure + accepted + + + - - + + Unauthorised Re-Identification + Georg P. Krog + 2022-08-19 + 2024-08-16 + + Something that acts as or causes Unauthorised Re-Identification + accepted + + + + Harshvardhan J. Pandit + + + + Compromise Account + Something that acts as or causes a compromised account that is then used by the compromiser accepted - Unwanted Data Deletion + 2024-08-16 2022-08-17 - Something that acts as or causes Unwanted Data Deletion - + + + + - - accepted + + 2024-08-16 - 2024-08-16 + Something that acts as or causes Sabotage + Sabotage 2022-08-17 - Unauthorised Code Modification + Harshvardhan J. Pandit - - Something that acts as or causes Unauthorised Code Modification + accepted + + - - - Illegal Data Processing - - - - 2024-08-16 - Something that acts as or causes Illegal Processing of Data - This concept was called "IllegalProcessingData" in DPV 2.0 + Harshvardhan J. Pandit accepted - 2022-08-17 - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - - 2024-08-16 - + Something that acts as or causes Account Credentials to be compromised + + Compromise Account Credentials + 2024-08-16 + - accepted - The criteria for what is considered material damage is based in jurisdictional laws and norms - Material Damage - Harshvardhan J. Pandit - 2022-03-30 - Something that acts as or causes Material Damage - + + - 2022-08-17 - Something that acts as or causes Unauthorised Information Disclosure - - Unauthorised Information Disclosure - + + accepted 2024-08-16 - + Unauthorised Information Disclosure + Something that acts as or causes Unauthorised Information Disclosure + 2022-08-17 + Harshvardhan J. Pandit - accepted + + - - Harshvardhan J. Pandit - Something that acts as or causes System Malfunction + accepted - + + 2024-08-16 + - 2024-08-16 - - Here system refers to both hardware and software systems + Harshvardhan J. Pandit + Psychological Harm 2022-08-17 - System Malfunction + Something that acts as or causes Psychological Harm + + + + + + + 2024-08-16 + Authorisation Failure + Something that acts as or causes Authorisation Failure + + accepted + 2022-08-17 + + Harshvardhan J. Pandit + + - - - ENISA Reference Incident Classification Taxonomy 2018 + + + + + accepted + Something that involves or causes judicial penalties to be paid + + Judicial Penalty + + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 + - + + The criteria for what is considered material damage is based in jurisdictional laws and norms + 2022-03-30 + Something that acts as or causes Non-Material Damage + + Harshvardhan J. Pandit + accepted + 2024-08-16 + Non-Material Damage + + + Harshvardhan J. Pandit + 2022-08-17 - - - Something that acts as or causes Spoofing - Spoofing + + + + Something that acts as or causes Unauthorised Code Disclosure accepted 2024-08-16 + Unauthorised Code Disclosure - + - - + + 2024-08-16 + - 2024-08-16 + 2022-08-17 Harshvardhan J. Pandit - - 2022-08-17 - Violation of Legal Obligations - Something that acts as or causes Violation of Legal Obligations - This concept was called "ViolationRegulatoryObligations" in DPV 2.0 - modified - + Malware Attack + accepted + + Something that acts as or causes Malware Attack + + + + - + + Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques + 2024-08-16 - Injury Harshvardhan J. Pandit + + Brute Force Authorisations accepted - Something that acts as or causes Injury - - 2024-08-16 2022-08-17 - - - - https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 - - - ENISA Threat Landscape for Ransomware Attacks 2022 - - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + + + - - accepted - - Something that acts as or causes Account Credentials to be compromised - Compromise Account Credentials + - Harshvardhan J. Pandit - 2022-08-17 - 2024-08-16 - - - - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - ENISA Threat Taxonomy 2016 + Accidental Misuse + accepted + Accidental Misuse + - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - + + - Unauthorised Code Disclosure + Unauthorised Access to Premises + 2022-08-17 Harshvardhan J. Pandit - Something that acts as or causes Unauthorised Code Disclosure - 2024-08-16 - 2022-08-17 - accepted + Something that acts as or causes Unauthorised Access to Premises + 2024-08-16 + + + + - - 2022-08-17 - + + - Harshvardhan J. Pandit - 2024-08-16 - Something that acts as or causes Physical Assault accepted - - Physical Assault - - - - - - + Something that acts as or causes Unauthorised Data Modification + Unauthorised Data Modification 2024-08-16 - Fraud - - - accepted - Something that acts as or causes Fraud 2022-08-17 + Harshvardhan J. Pandit + - - ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html + + + + + Risks and issues that affect or have the potential to affect specific individuals + accepted + Individual Risk - + + Here equipment refers to physical equipment + + accepted 2022-08-17 - Blackmail - Harshvardhan J. Pandit - Something that acts as or causes Blackmail + Equipment Malfunction 2024-08-16 - - accepted - + Harshvardhan J. Pandit + Something that acts as or causes Equipment Malfunction + + - + accepted + 2022-08-17 + 2024-08-16 + + Harshvardhan J. Pandit + Something that acts as or causes System Intrusion + System Intrusion - Something that acts as or causes Component Failure - Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of - Component Failure - + + + + - + + Financial Loss + Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity + 2024-08-16 + + + Harshvardhan J. Pandit accepted - 2024-08-16 2022-08-17 - Something that acts as or causes Unauthorised Access to Premises - - Unauthorised Access to Premises + + + + + ENISA Reference Incident Classification Taxonomy 2018 + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + Detriment - + Something that acts as or causes Detriment + 2022-03-23 + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves + 2024-08-16 + accepted + + + + + + + + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres + + Something that acts as or causes benefits + 2022-03-23 + accepted + Benefit + 2024-08-16 + + + + ISO/IEC 27005:2018 + + https://www.iso.org/standard/75281.html - Delaram Golpayegani + 2024-06-11 + accepted + Misuse + Something that acts as or causes Misuse 2024-08-16 + Delaram Golpayegani + + + + 2024-08-16 + Limitation of Rights + + + - Misuse + 2022-08-18 + This concept was called "LimitationOfRights" in DPV 2.0 accepted - 2024-06-11 - + Something that acts as or causes Limitation of Rights + Georg P. Krog, Harshvardhan J. Pandit + - - - Axel Polleres - Julian Flake - Fajar Ekaputra - Beatriz Esteves - Delaram Golpayegani - Georg P. Krog + + Something that acts as or causes Denial of Service Attack (DoS) + Harshvardhan J. Pandit - Delaram Golpayegani - Beatriz Esteves - Julian Flake - Rob Brennan - Harshvardhan J. Pandit - Paul Ryan - Georg P. Krog - https://w3id.org/dpv/risk - 2.1-dev - https://w3id.org/dpv/risk# - - - - - 2024-07-13 - 2022-08-14 - Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management - - - - - - - - - 2.1-dev - 10.5281/zenodo.12505841 - - http://www.w3.org/2004/02/skos/core - - http://www.w3.org/2000/01/rdf-schema - Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 - - - - 2022-08-14 - http://purl.org/ontology/bibo/status/published - RISK - Risk Concepts - - - risk - - + Denial of Service Attack (DoS) + accepted + 2022-08-17 + 2024-08-16 - 2024-04-14 - Georg P. Krog, Harshvardhan J. Pandit - Fee - DGA 2.10 - Something that acts as or provides fees e.g. for using a service - modified + + + + + + accepted + 2022-08-17 2024-08-16 + + + + + Something that acts as or causes Malicious Code Attack - + Harshvardhan J. Pandit + Malicious Code Attack + + + + - - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves + - - Detriment - accepted + Something that acts as or causes Scam 2024-08-16 - 2022-03-23 - Something that acts as or causes Detriment - - - - + 2022-08-17 - Something that acts as or causes Loss of Customer Confidence - Lose of Customer Confidence - - - Harshvardhan J. Pandit - 2024-08-16 accepted - + Scam + + - + + ENISa Trust Services Security Incidents 2021 + + https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 + + + Harshvardhan J. Pandit + accepted + 2022-08-17 - Something that acts as or causes Identity Theft - - Harshvardhan J. Pandit - Identity Theft - accepted + Something that acts as or causes Security Breach + + Security Breach 2024-08-16 - 2022-08-17 + + + - - + + - Violence against children - Harshvardhan J. Pandit - Something that acts as or causes Child Violence - 2024-08-16 - 2022-08-17 - This concept was called "ChildViolence" in DPV 2.0 - + Something that acts as or causes Social Disadvantage accepted - + 2024-08-16 + Georg P. Krog + Social Disadvantage + 2022-08-19 + - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ENISA Methodology for Sectoral Cybersecurity Assessments - - Accidental Misuse - Accidental Misuse + - - accepted - - - - Something that acts as or causes Data Breach accepted - - - - - - 2024-08-16 - 2022-08-17 - Data Breach - Harshvardhan J. Pandit - + Intentional Misuse + Intentional Misuse - + - + + Unwanted Code Deletion - Something that acts as or causes Terrorism - - - Harshvardhan J. Pandit - 2024-08-16 - - Terrorism - accepted - 2022-08-17 - - - - Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques - Harshvardhan J. Pandit - 2022-08-17 accepted - Brute Force Authorisations + Something that acts as or causes Unwanted Code Deletion + + 2022-08-17 2024-08-16 - - + + - - - - - - Something that acts as or causes Component Malfunction - Component Malfunction - Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of - accepted - + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + - - Unauthorised System Modification - Harshvardhan J. Pandit - accepted - - - - + 2024-08-16 + This concept was called "ViolationEthicalCode" in DPV 2.0 2022-08-17 - Something that acts as or causes Unauthorised System Modification - - - + Harshvardhan J. Pandit - accepted - - + + Something that acts as or causes Violation of Ethics Code + Violating Ethics Code + modified + - + + Harshvardhan J. Pandit - accepted + Unwanted Disclosure of Data + 2022-08-17 + Something that acts as or causes Unwanted Disclosure of Data + accepted + 2024-08-16 - 2022-08-17 - - Here system refers to both hardware and software systems - Something that acts as or causes System Failure - System Failure - - + + - + + accepted 2024-08-16 - 2022-08-17 - + - Harshvardhan J. Pandit - Sexual Violence - accepted - - Something that acts as or causes Sexual Violence - - - - https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 + 2024-04-14 + Something that acts as or provides renumeration which is in monetary or financial form + Georg P. Krog, Harshvardhan J. Pandit + Remuneration + - + + Something that acts as or causes Distributed Denial of Service Attack (DDoS) 2024-08-16 - 2022-08-17 - + - - Phishing Scam - Something that acts as or causes Phishing Scam Harshvardhan J. Pandit + Distributed Denial of Service Attack (DDoS) accepted + 2022-08-17 + + - - https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - + + 2024-08-16 + Terrorism + - This concept was called "PreventExercisingOfRights" in DPV 2.0 - Something that acts as or causes Prevent Exercising of Rights - Georg P. Krog, Harshvardhan J. Pandit - 2022-08-18 - 2024-08-16 - Prevent Exercising of Rights + Harshvardhan J. Pandit accepted + 2022-08-17 + Something that acts as or causes Terrorism + - - Something that acts as or causes Erroneous System Use - 2022-08-17 - Erroneous System Use - - - - Harshvardhan J. Pandit - 2024-08-16 - - - accepted - + + + + + + Risk Concepts - RDF/XML serialiation + - - modified - Something that acts as or causes Violation of Ethics Code + + ISO/IEC 27005:2018 + + https://www.iso.org/standard/75281.html + + - 2024-08-16 + Unauthorised Code Modification + Something that acts as or causes Unauthorised Code Modification + 2022-08-17 - Violating Ethics Code - - This concept was called "ViolationEthicalCode" in DPV 2.0 Harshvardhan J. Pandit - - - - - Something that acts as or causes Distributed Denial of Service Attack (DDoS) accepted - 2022-08-17 - Distributed Denial of Service Attack (DDoS) - - - - - Harshvardhan J. Pandit 2024-08-16 + - + + 2022-08-17 + accepted - Something that acts as or causes Psychological Harm - - Harshvardhan J. Pandit - Psychological Harm - accepted + 2024-08-16 - 2022-08-17 - - - - + Something that acts as or causes Identity Theft + Identity Theft - - - - - Lose of Trust Harshvardhan J. Pandit - 2022-08-17 - accepted - 2024-08-16 - Something that acts as or causes Loss of Trust - + + - - 2024-08-16 - Something that acts as or causes Malicious Code Attack - - accepted + + 2024-08-16 + + Harshvardhan J. Pandit + Intercept Communications + This concept was called "InterceptionCommunications" in DPV 2.0 2022-08-17 - Malicious Code Attack - + Something that acts as or causes Interception of Communications + modified + - - https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 + + https://www.iso.org/standard/75281.html - + + 2022-08-17 + This concept was called "ViolationCodeConduct" in DPV 2.0 + Violating Code of Conduct + Something that acts as or causes Violation of Code of Conduct + 2024-08-16 - 2022-08-17 - Something that acts as or causes Violation of Statutory Obligations - Violation of Statutory Obligations - - Harshvardhan J. Pandit - This concept was called "ViolationStatutoryObligations" in DPV 2.0 modified + Harshvardhan J. Pandit - - - Harshvardhan J. Pandit - - accepted - 2024-08-16 - Lose of Goodwill - + + modified + + Violation of Legal Obligations + Something that acts as or causes Violation of Legal Obligations + 2024-08-16 2022-08-17 - Something that acts as or causes Loss of Goodwill - + + + Harshvardhan J. Pandit + This concept was called "ViolationRegulatoryObligations" in DPV 2.0 + - - https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - 2022-08-17 - + + 2024-08-16 + - Something that acts as or causes Personal Safety Endangerment Harshvardhan J. Pandit - Personal Safety Endangerment - 2024-08-16 - + Lose of Credibility + + Something that acts as or causes Loss of Credibility accepted - + 2022-08-17 + - - accepted + - Harshvardhan J. Pandit 2022-08-17 - Something that acts as or causes Vulnerability Created - + Harshvardhan J. Pandit + Something that acts as or causes Loss of Reputation + accepted + Lose of Reputation + 2024-08-16 - Vulnerability Created - + - - Something that acts as or causes Confidentiality Breach - Confidentiality Breach - + + - 2024-08-16 - - 2022-08-17 - Harshvardhan J. Pandit accepted + - + + 2024-08-16 - Privacy - accepted + Payment - - - - Something that acts as or causes Malware Attack + 2024-04-14 accepted + Something that acts as or provides payment e.g. to access a service or purchase resources + Georg P. Krog, Harshvardhan J. Pandit + + + - Harshvardhan J. Pandit - 2024-08-16 + Lose of Trust + Something that acts as or causes Loss of Trust 2022-08-17 - - Malware Attack - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - accepted - - - - - Internal Security Threat - Concepts associated with security threats and issues that originate within the organisation - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + 2024-08-16 + Harshvardhan J. Pandit + + - - + + - Harshvardhan J. Pandit - 2024-08-16 - Something that acts as or causes Human Errors + Harshvardhan J. Pandit + + accepted - Human Errors + Something that acts as or causes Data Breach 2022-08-17 - - - - ENISA Threat Taxonomy 2016 - - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + 2024-08-16 + Data Breach + + + + - - - Lose of Reputation - - - - - Harshvardhan J. Pandit - 2022-08-17 + + Something that acts as or causes Sexual Violence accepted 2024-08-16 - Something that acts as or causes Loss of Reputation - - - - - Lose of Opportunity - + + - Something that acts as or causes Loss of Opportunity + Sexual Violence Harshvardhan J. Pandit - 2024-08-16 - accepted 2022-08-17 - + - - + + Here system refers to both hardware and software systems + + 2024-08-16 + - Something that acts as or causes Unauthorised Resource Use + 2022-08-17 - Unauthorised Resource Use Harshvardhan J. Pandit - 2024-08-16 - 2022-08-17 - + System Failure accepted - + Something that acts as or causes System Failure + + - - Risks and issues that affect or have the potential to affect specific individuals - Individual Risk - accepted + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + + Something that acts as or causes Violation of Statutory Obligations + modified + This concept was called "ViolationStatutoryObligations" in DPV 2.0 + 2024-08-16 + 2022-08-17 + Violation of Statutory Obligations + Harshvardhan J. Pandit + - + 2022-08-17 - Something that acts as or causes Unauthorised Data Modification - Unauthorised Data Modification - + + - Harshvardhan J. Pandit + accepted 2024-08-16 + Spoofing - accepted + Harshvardhan J. Pandit + Something that acts as or causes Spoofing + + + - - Guides for Data Privacy Vocabulary - - - - - - - + - Societal Health & Safety accepted + + Identity Fraud + Something that acts as or causes Identity Fraud + 2024-08-16 + 2022-08-17 - - - - Examples for Data Privacy Vocabulary - - - - - + Harshvardhan J. Pandit + + - + + + 2024-08-16 + 2022-08-17 + + Harshvardhan J. Pandit + Violation of Contractual Obligation + + + This concept was called "ViolationContractualObligations" in DPV 2.0 + modified + Something that acts as or causes Violation of Contractual Obligations + + + + ENISA Methodology for Sectoral Cybersecurity Assessments + + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + 2024-08-16 + Something that acts as or causes Human Errors + + Harshvardhan J. Pandit accepted - Risks and issues that affect or have the potential to affect society at large or specific groups in society - Societal Risk - + 2022-08-17 + Human Errors + + - - accepted - Something that acts as or causes Impact to Rights + + + Julian Flake + Fajar Ekaputra Harshvardhan J. Pandit - 2022-08-17 + Beatriz Esteves + Axel Polleres + Georg P. Krog + Delaram Golpayegani + Paul Ryan + Georg P. Krog + Delaram Golpayegani + Harshvardhan J. Pandit + Beatriz Esteves + Rob Brennan + Julian Flake + http://www.w3.org/2004/02/skos/core + + http://www.w3.org/2000/01/rdf-schema + + + + 10.5281/zenodo.12505841 + + + + + + + + + + + + + Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 + http://purl.org/ontology/bibo/status/published + 2022-08-14 + https://w3id.org/dpv/risk + Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management + 2.1-dev + + 2022-08-14 + + + RISK + risk + 2.1-dev + 2024-07-13 + Risk Concepts + https://w3id.org/dpv/risk# + + + https://www.iso.org/standard/75281.html + + ISO/IEC 27005:2018 + + + + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + Damage + Something that acts as or causes Damage + accepted + 2022-03-30 - Impact to Rights - This concept was called "ImpactToRights" in DPV 2.0 - - 2024-08-16 - - + + Harshvardhan J. Pandit + - - + + 2024-08-16 + - Something that acts as or causes Social Disadvantage - Social Disadvantage - 2022-08-19 - + Harshvardhan J. Pandit + accepted - Georg P. Krog - 2024-08-16 - + 2022-08-17 + + Unwanted Data Deletion + Something that acts as or causes Unwanted Data Deletion + + + - + - - accepted - Authorisation Failure - Harshvardhan J. Pandit - 2024-08-16 + Something that acts as or causes Phishing Scam + + accepted 2022-08-17 - Something that acts as or causes Authorisation Failure - + 2024-08-16 + Phishing Scam + Harshvardhan J. Pandit + + - - - + + + Harshvardhan J. Pandit + 2022-08-17 + Cryptojacking + + Something that acts as or causes Cryptojacking accepted 2024-08-16 - Something that acts as or causes Identity Fraud - Harshvardhan J. Pandit - Identity Fraud + + + + + Something that acts as or causes Injury + accepted 2022-08-17 - + + Harshvardhan J. Pandit + + + + + Injury + 2024-08-16 + - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - - - - - Primer for Data Privacy Vocabulary - - - - - Things that cause or have the potential to impact financial resources + + accepted + 2022-08-17 + + + + Unauthorised System Access + 2024-08-16 + + Harshvardhan J. Pandit + Something that acts as or causes Unauthorised System Access + + + + + + + Blackmail + Harshvardhan J. Pandit accepted - Financial Impact - + 2022-08-17 + Something that acts as or causes Blackmail + + 2024-08-16 + + - - + + Something that acts as or causes Unauthorised Code Access + + 2024-08-16 2022-08-17 - Financial Loss - Harshvardhan J. Pandit - Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity accepted + Unauthorised Code Access + + + + + + accepted + + 2024-04-14 + + + + Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + Reward + 2024-08-16 + Georg P. Krog, Harshvardhan J. Pandit - + Environmental Risk + Risks and issues that have their origin in environment or can affect the environment at large accepted - Environmental Risk - - Harshvardhan J. Pandit - accepted + + Copyright Violation + Something that acts as or causes Copyright Violation - Re-identification + accepted + 2022-08-17 + + Harshvardhan J. Pandit + 2024-08-16 - Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification - 2022-08-19 + + + + + + + Something that involves or causes judicial costs to be paid - Something that acts as or causes Re-identification - + Judicial Costs + accepted + - - Coercion + + Unauthorised System Modification + - + Something that acts as or causes Unauthorised System Modification + 2024-08-16 + Harshvardhan J. Pandit accepted - Something that acts as or causes Coercion - 2024-08-16 2022-08-17 - + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - Cryptojacking - Harshvardhan J. Pandit - Something that acts as or causes Cryptojacking - + Georg P. Krog, Harshvardhan J. Pandit + Violation of Rights + 2022-08-18 + This concept was called "ViolationOfRights" in DPV 2.0 + Something that acts as or causes Violation of Rights accepted 2024-08-16 + + + + + + + Unauthorised Data Access + Something that acts as or causes Unauthorised Data Access + 2024-08-16 + + + Harshvardhan J. Pandit + accepted 2022-08-17 + - - ENISA Reference Incident Classification Taxonomy 2018 - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + + accepted + Concepts associated with security threats that are likely to originate externally + + External Security Threat + - + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - - Equipment Failure + + https://www.iso.org/standard/75281.html + + ISO/IEC 27005:2018 + + + Individual Health & Safety - - - Harshvardhan J. Pandit - Here equipment refers to physical equipment - 2024-08-16 - 2022-08-17 accepted - Something that acts as or causes Equipment Failure - + + - - 2022-08-17 - - + + Something that acts as or causes Fraud + accepted + 2024-08-16 - Harshvardhan J. Pandit - Denial of Service Attack (DoS) - Something that acts as or causes Denial of Service Attack (DoS) - 2024-08-16 - accepted + Harshvardhan J. Pandit + Fraud + + 2022-08-17 + - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - + Harshvardhan J. Pandit - + + Public Order Breach + + - 2022-03-30 - Non-Material Damage - - Something that acts as or causes Non-Material Damage - 2024-08-16 - The criteria for what is considered material damage is based in jurisdictional laws and norms accepted + Something that acts as or causes Public Order Breach + 2022-08-17 + 2024-08-16 - - - Something that acts as or causes benefits + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + + - Benefit + + Something that acts as or causes Illegal Processing of Data + Illegal Data Processing 2024-08-16 - 2022-03-23 accepted - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres - + 2022-08-17 + + Harshvardhan J. Pandit + This concept was called "IllegalProcessingData" in DPV 2.0 + - - Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + accepted + Risks and issues that have their basis in legal requirements and enforcement - 2024-08-16 + Legal Risk - accepted - Reward - 2024-04-14 - Georg P. Krog, Harshvardhan J. Pandit - + - - ENISA Threat Landscape 2021 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 - - Judicial Costs - - - - - accepted - Something that involves or causes judicial costs to be paid - + + https://www.iso.org/standard/75281.html + + ISO/IEC 27005:2018 - - Georg P. Krog, Harshvardhan J. Pandit - Something that acts as or provides payment e.g. to access a service or purchase resources + accepted + 2022-08-17 + 2024-08-16 - 2024-08-16 - 2024-04-14 - Payment - + Harshvardhan J. Pandit + + Personal Safety Endangerment + Something that acts as or causes Personal Safety Endangerment + - - Concepts associated with security threats that are likely to originate externally + + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ENISA Methodology for Sectoral Cybersecurity Assessments + + + + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + + + + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + + https://www.iso.org/standard/75281.html + + ISO/IEC 27005:2018 + + accepted - + + Something that acts as or causes violation of policy which can be either internal or external policy - External Security Threat - + Violating Policy + - + - 2024-04-14 - - Something that acts as or provides renumeration which is in monetary or financial form - 2024-08-16 - Georg P. Krog, Harshvardhan J. Pandit accepted - Remuneration - + Risks and issues that affect or have the potential to affect society at large or specific groups in society + Societal Risk + + - - + + accepted + 2024-08-16 + - Security Attack - Something that acts as or causes an attack on security with the aim of undermining it - accepted + Harshvardhan J. Pandit + + 2022-08-17 + Something that acts as or causes Extorsion + Extorsion + - - - - - - Risk Concepts - JSON-LD serialiation - - - - + + - 2024-08-16 - 2022-08-17 - Something that acts as or causes Unwanted Disclosure of Data - Unwanted Disclosure of Data - Harshvardhan J. Pandit - accepted - - - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - ENISA Methodology for Sectoral Cybersecurity Assessments - - - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 + + - - + + Impact to Rights + - 2024-08-16 + accepted 2022-08-17 - accepted - Something that acts as or causes Loss of Credibility - - Lose of Credibility Harshvardhan J. Pandit - + This concept was called "ImpactToRights" in DPV 2.0 + Something that acts as or causes Impact to Rights + + 2024-08-16 + + - - This concept was called "InterceptionCommunications" in DPV 2.0 - - Harshvardhan J. Pandit - Something that acts as or causes Interception of Communications + 2022-08-17 - + 2024-08-16 + modified + This concept was called "Corruption Data" in DPV 2.0 - modified - Intercept Communications - 2024-08-16 - + Data Corruption + + Something that acts as or causes Corruption of Data + Harshvardhan J. Pandit + + + - - 2024-08-16 - + + - 2022-08-17 - - Something that acts as or causes Unwanted Code Deletion - Unwanted Code Deletion - Harshvardhan J. Pandit + Privacy accepted - + - - + + The criteria for what is considered material damage is based in jurisdictional laws and norms + Something that acts as or causes Material Damage accepted + 2024-08-16 - Concepts associated with risks that arise due to User or Human use - User Risks - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - + 2022-03-30 + Material Damage + Harshvardhan J. Pandit + + + + Harm + This concept refers to the general abstract notion of harm + Something that acts as or causes Harm to humans + 2024-08-16 + + Harshvardhan J. Pandit + 2022-08-13 accepted - Judicial Penalty - Something that involves or causes judicial penalties to be paid - + - - + + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 + + + Something that acts as or causes Erroneous System Use + accepted + 2022-08-17 + 2024-08-16 + - 2024-08-16 - 2022-08-17 - - Something that acts as or causes Extorsion Harshvardhan J. Pandit - accepted - Extorsion - + + Erroneous System Use + - - 2022-08-13 - Harshvardhan J. Pandit + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + accepted + Something that acts as or causes Loss of Opportunity + 2024-08-16 - Something that acts as or causes Harm to humans - 2024-08-16 - Harm - This concept refers to the general abstract notion of harm - + Harshvardhan J. Pandit + Lose of Opportunity + + 2022-08-17 + - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - Something that acts as or causes Discrimination - accepted - Georg P. Krog - 2024-08-16 - 2022-08-19 - Discrimination + Societal Health & Safety + accepted - + - Something that acts as or causes violation of policy which can be either internal or external policy - + Georg P. Krog, Harshvardhan J. Pandit accepted - Violating Policy - + This concept was called "PreventExercisingOfRights" in DPV 2.0 + 2024-08-16 + + Something that acts as or causes Prevent Exercising of Rights + 2022-08-18 + Prevent Exercising of Rights + - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + - - - https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 - - Harshvardhan J. Pandit + + + + + + accepted + Operational Security Risk + Risks and issues that arise during operational processes + + + - Something that acts as or causes Scam 2024-08-16 + Something that acts as or causes Coercion + + Coercion + + Harshvardhan J. Pandit accepted 2022-08-17 - Scam - - + - + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ ENISA Reference Incident Classification Taxonomy 2018 - - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ ENISA Reference Incident Classification Taxonomy 2018 + - - Something that acts as or causes Equipment Malfunction - Equipment Malfunction + - Here equipment refers to physical equipment - - - Harshvardhan J. Pandit - accepted - 2024-08-16 - 2022-08-17 - - - - Harshvardhan J. Pandit - Damage + Compensation + Something that acts as or provides compensation - which can be monetary and financial or in other forms accepted - - - 2024-08-16 + Georg P. Krog, Harshvardhan J. Pandit - 2022-03-30 - Something that acts as or causes Damage - + 2024-04-14 + - - Harshvardhan J. Pandit - - accepted - 2022-08-17 - - - - - Something that acts as or causes Copyright Violation - 2024-08-16 - Copyright Violation - + + + + + + + Risk Concepts - JSON-LD serialiation - - + - - Unauthorised Re-Identification - 2022-08-19 - Something that acts as or causes Unauthorised Re-Identification - - Georg P. Krog - 2024-08-16 - accepted - - - - Something that acts as or causes Unauthorised Data Disclosure - Harshvardhan J. Pandit - Unauthorised Data Disclosure - - - 2024-08-16 - + Unauthorised Resource Use accepted + Something that acts as or causes Unauthorised Resource Use + + 2024-08-16 2022-08-17 + + Harshvardhan J. Pandit + - + - Physical Harm - - accepted - - - + Something that acts as or causes Loss of Customer Confidence + Lose of Customer Confidence 2024-08-16 + 2022-08-17 - - - - - Something that acts as or causes Unauthorised System Access - Unauthorised System Access Harshvardhan J. Pandit accepted - - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 + - - - https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - - Risk Concepts - Turtle serialiation - - - - - - - - - - - Individual Health & Safety - accepted - - - - ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - Legal Risk - accepted + + accepted - Risks and issues that have their basis in legal requirements and enforcement + Financial Impact + Things that cause or have the potential to impact financial resources - - - - - Sabotage - - Something that acts as or causes Sabotage - 2024-08-16 - Harshvardhan J. Pandit + + accepted - 2022-08-17 - - - - accepted + 2024-08-16 - Harshvardhan J. Pandit - 2022-08-17 + Something that acts as or causes Confidentiality Breach + Confidentiality Breach - - 2024-08-16 - Something that acts as or causes Unauthorised Code Access - Unauthorised Code Access - + Harshvardhan J. Pandit + + + + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - + + + Here system refers to both hardware and software systems accepted - Reputational Risk + 2024-08-16 + System Malfunction + + 2022-08-17 - Risks and issues that affect the reputation of the organisation - + Harshvardhan J. Pandit + Something that acts as or causes System Malfunction + + - + https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + ISO/IEC 27005:2018 - - accepted - - - - Risks and issues that arise during operational processes - - Operational Security Risk - + + Risk Concepts - Turtle serialiation + + + + + - + + Primer for Data Privacy Vocabulary + + + + + + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - + + Something that acts as or causes Discrimination + 2022-08-19 + - 2024-08-16 - System Intrusion - Something that acts as or causes System Intrusion - accepted - Harshvardhan J. Pandit - 2022-08-17 - + accepted + Discrimination + Georg P. Krog + - - - - Risk Concepts - N3 serialiation - - - + + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 + + + https://www.iso.org/standard/75281.html + + ISO/IEC 27005:2018 Unauthorised Activity + accepted Something that acts as or causes Unauthorised Activity - accepted + + + - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 - + + ENISA Threat Landscape 2021 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 + + + + + Risk Concepts - N3 serialiation + - - - Risk Concepts - RDF/XML serialiation - - - - https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 + - - 2022-08-17 - - - - - - Harshvardhan J. Pandit - Something that acts as or causes Unauthorised Data Access - Unauthorised Data Access - 2024-08-16 + accepted - - - - Georg P. Krog, Harshvardhan J. Pandit - This concept was called "LimitationOfRights" in DPV 2.0 - Something that acts as or causes Limitation of Rights - + - Limitation of Rights - 2022-08-18 - 2024-08-16 + User Risks - accepted - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + Concepts associated with risks that arise due to User or Human use + - - ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - + + + + + + Examples for Data Privacy Vocabulary + - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + - - https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 - - https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - - - ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + + https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks ENISA Threat Landscape for Ransomware Attacks 2022 - + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + ENISA Reference Incident Classification Taxonomy 2018 - - ISO/IEC 27005:2018 + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - ENISA Methodology for Sectoral Cybersecurity Assessments - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - ENISA Threat Taxonomy 2016 + + https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + ENISA Threat Landscape for Ransomware Attacks 2022 - + https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 - - - https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - ENISA Reference Incident Classification Taxonomy 2018 + + accepted + + + + Physical Harm + + - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + - ENISA Reference Incident Classification Taxonomy 2018 + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + - ENISA Reference Incident Classification Taxonomy 2018 + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 - ENISa Trust Services Security Incidents 2021 - - + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - + - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - accepted - Intentional Misuse - - - - - Intentional Misuse - + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - + + + + + + + Guides for Data Privacy Vocabulary - - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - ENISA Threat Taxonomy 2016 + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - + Risk Concepts - HTML serialiation - + + - + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment ENISA Methodology for Sectoral Cybersecurity Assessments - + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - ENISA Methodology for Sectoral Cybersecurity Assessments https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ENISA Methodology for Sectoral Cybersecurity Assessments - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ENISA Methodology for Sectoral Cybersecurity Assessments diff --git a/2.1-dev/risk/modules/risk_consequences-owl.ttl b/2.1-dev/risk/modules/risk_consequences-owl.ttl index 100050053..1fdb2d194 100644 --- a/2.1-dev/risk/modules/risk_consequences-owl.ttl +++ b/2.1-dev/risk/modules/risk_consequences-owl.ttl @@ -34,7 +34,9 @@ risk-owl:AuthorisationFailure a rdfs:Class, schema:name "ENISa Trust Services Security Incidents 2021" ; schema:url "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Authorisation Failure"@en ; skos:prefLabel "Authorisation Failure"@en . @@ -43,7 +45,8 @@ risk-owl:AvailabilityBreach a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:DataBreach ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:DataBreach ; sw:term_status "accepted"@en . risk-owl:Benefit a rdfs:Class, @@ -68,7 +71,8 @@ risk-owl:Blackmail a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Blackmail"@en ; skos:prefLabel "Blackmail"@en . @@ -83,7 +87,9 @@ risk-owl:BruteForceAuthorisations a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; skos:prefLabel "Brute Force Authorisations"@en . @@ -98,7 +104,8 @@ risk-owl:Coercion a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Coercion"@en ; skos:prefLabel "Coercion"@en . @@ -119,7 +126,8 @@ risk-owl:ComponentFailure a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Component Failure"@en ; skos:prefLabel "Component Failure"@en ; @@ -129,7 +137,8 @@ risk-owl:ComponentMalfunction a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Component Malfunction"@en ; skos:prefLabel "Component Malfunction"@en ; @@ -145,7 +154,10 @@ risk-owl:CompromiseAccount a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ; skos:prefLabel "Compromise Account"@en . @@ -160,7 +172,8 @@ risk-owl:CompromiseAccountCredentials a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ; skos:prefLabel "Compromise Account Credentials"@en . @@ -175,7 +188,8 @@ risk-owl:ConfidentialityBreach a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:DataBreach ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:DataBreach ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Confidentiality Breach"@en ; skos:prefLabel "Confidentiality Breach"@en . @@ -205,7 +219,8 @@ risk-owl:Cryptojacking a rdfs:Class, schema:name "ENISA Threat Landscape 2021" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Cryptojacking"@en ; skos:prefLabel "Cryptojacking"@en . @@ -234,7 +249,10 @@ risk-owl:DataBreach a rdfs:Class, vann:example dex-owl:E0069, dex-owl:E0071 ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SecurityBreach ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:SecurityBreach ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Data Breach"@en ; skos:prefLabel "Data Breach"@en . @@ -249,7 +267,8 @@ risk-owl:DataCorruption a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:IntegrityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Corruption of Data"@en ; skos:prefLabel "Data Corruption"@en ; @@ -262,13 +281,11 @@ risk-owl:DenialServiceAttack a rdfs:Class, dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ], - [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ; skos:prefLabel "Denial of Service Attack (DoS)"@en . @@ -307,7 +324,8 @@ risk-owl:DistributedDenialServiceAttack a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ; skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en . @@ -331,7 +349,8 @@ risk-owl:EquipmentFailure a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Equipment Failure"@en ; skos:prefLabel "Equipment Failure"@en ; @@ -347,7 +366,8 @@ risk-owl:EquipmentMalfunction a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Equipment Malfunction"@en ; skos:prefLabel "Equipment Malfunction"@en ; @@ -403,7 +423,8 @@ risk-owl:Extorsion a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Extorsion"@en ; skos:prefLabel "Extorsion"@en . @@ -455,7 +476,8 @@ risk-owl:Fraud a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Fraud"@en ; skos:prefLabel "Fraud"@en . @@ -498,7 +520,8 @@ risk-owl:IdentityFraud a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Identity Fraud"@en ; skos:prefLabel "Identity Fraud"@en . @@ -513,7 +536,8 @@ risk-owl:IdentityTheft a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Identity Theft"@en ; skos:prefLabel "Identity Theft"@en . @@ -568,7 +592,8 @@ risk-owl:IntegrityBreach a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:DataBreach ; + rdfs:subClassOf risk-owl:DataBreach, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en . risk-owl:IntentionalMisuse a rdfs:Class, @@ -590,21 +615,13 @@ risk-owl:InterceptCommunications a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Interception of Communications"@en ; skos:prefLabel "Intercept Communications"@en ; skos:scopeNote "This concept was called \"InterceptionCommunications\" in DPV 2.0"@en . -risk-owl:InternalSecurityThreat a rdfs:Class, - owl:Class, - dpv-owl:RiskConcept ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:RiskConcept ; - sw:term_status "accepted"@en ; - skos:definition "Concepts associated with security threats and issues that originate within the organisation"@en ; - skos:prefLabel "Internal Security Threat"@en . - risk-owl:JudicialCosts a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; @@ -747,7 +764,10 @@ risk-owl:MaliciousCodeAttack a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Malicious Code Attack"@en ; skos:prefLabel "Malicious Code Attack"@en . @@ -762,7 +782,10 @@ risk-owl:MalwareAttack a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Malware Attack"@en ; skos:prefLabel "Malware Attack"@en . @@ -851,7 +874,8 @@ risk-owl:PhishingScam a rdfs:Class, schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Phishing Scam"@en ; skos:prefLabel "Phishing Scam"@en . @@ -924,7 +948,8 @@ risk-owl:Reidentification a rdfs:Class, dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Re-identification"@en ; skos:prefLabel "Re-identification"@en ; @@ -1029,7 +1054,9 @@ risk-owl:Sabotage a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Sabotage"@en ; skos:prefLabel "Sabotage"@en . @@ -1044,7 +1071,8 @@ risk-owl:Scam a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Scam"@en ; skos:prefLabel "Scam"@en . @@ -1053,7 +1081,10 @@ risk-owl:SecurityAttack a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ; skos:prefLabel "Security Attack"@en . @@ -1068,7 +1099,10 @@ risk-owl:SecurityBreach a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Security Breach"@en ; skos:prefLabel "Security Breach"@en . @@ -1130,7 +1164,9 @@ risk-owl:Spoofing a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat, + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept, risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Spoofing"@en ; @@ -1146,7 +1182,8 @@ risk-owl:SystemFailure a rdfs:Class, schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes System Failure"@en ; skos:prefLabel "System Failure"@en ; @@ -1162,7 +1199,10 @@ risk-owl:SystemIntrusion a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes System Intrusion"@en ; skos:prefLabel "System Intrusion"@en . @@ -1177,7 +1217,8 @@ risk-owl:SystemMalfunction a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes System Malfunction"@en ; skos:prefLabel "System Malfunction"@en ; @@ -1208,7 +1249,10 @@ risk-owl:UnauthorisedAccesstoPremises a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ; skos:prefLabel "Unauthorised Access to Premises"@en . @@ -1217,7 +1261,10 @@ risk-owl:UnauthorisedActivity a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Activity"@en ; skos:prefLabel "Unauthorised Activity"@en . @@ -1232,7 +1279,9 @@ risk-owl:UnauthorisedCodeAccess a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Code Access"@en ; skos:prefLabel "Unauthorised Code Access"@en . @@ -1247,7 +1296,8 @@ risk-owl:UnauthorisedCodeDisclosure a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ; skos:prefLabel "Unauthorised Code Disclosure"@en . @@ -1262,7 +1312,8 @@ risk-owl:UnauthorisedCodeModification a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ; skos:prefLabel "Unauthorised Code Modification"@en . @@ -1277,7 +1328,8 @@ risk-owl:UnauthorisedDataAccess a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Data Access"@en ; skos:prefLabel "Unauthorised Data Access"@en . @@ -1292,7 +1344,8 @@ risk-owl:UnauthorisedDataDisclosure a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ; skos:prefLabel "Unauthorised Data Disclosure"@en . @@ -1307,7 +1360,8 @@ risk-owl:UnauthorisedDataModification a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ; skos:prefLabel "Unauthorised Data Modification"@en . @@ -1322,7 +1376,8 @@ risk-owl:UnauthorisedInformationDisclosure a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ; skos:prefLabel "Unauthorised Information Disclosure"@en . @@ -1334,7 +1389,8 @@ risk-owl:UnauthorisedReidentification a rdfs:Class, dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ; skos:prefLabel "Unauthorised Re-Identification"@en . @@ -1349,7 +1405,8 @@ risk-owl:UnauthorisedResourceUse a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ; skos:prefLabel "Unauthorised Resource Use"@en . @@ -1364,7 +1421,9 @@ risk-owl:UnauthorisedSystemAccess a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised System Access"@en ; skos:prefLabel "Unauthorised System Access"@en . @@ -1379,7 +1438,8 @@ risk-owl:UnauthorisedSystemModification a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised System Modification"@en ; skos:prefLabel "Unauthorised System Modification"@en . @@ -1394,7 +1454,9 @@ risk-owl:UnwantedCodeDeletion a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ; skos:prefLabel "Unwanted Code Deletion"@en . @@ -1409,7 +1471,9 @@ risk-owl:UnwantedDataDeletion a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ; skos:prefLabel "Unwanted Data Deletion"@en . @@ -1424,7 +1488,8 @@ risk-owl:UnwantedDisclosureData a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ; skos:prefLabel "Unwanted Disclosure of Data"@en . @@ -1543,21 +1608,6 @@ risk-owl:ViolenceAgainstChildren a rdfs:Class, skos:prefLabel "Violence against children"@en ; skos:scopeNote "This concept was called \"ChildViolence\" in DPV 2.0"@en . -risk-owl:VulnerabilityCreated a rdfs:Class, - owl:Class, - dpv-owl:RiskConcept ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:modified "2024-08-16"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:InternalSecurityThreat ; - sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Vulnerability Created"@en ; - skos:prefLabel "Vulnerability Created"@en . - risk-owl:serialisation-html a profile:ResourceDescriptor ; dct:conformsTo ; dct:format ; diff --git a/2.1-dev/risk/modules/risk_consequences.csv b/2.1-dev/risk/modules/risk_consequences.csv index f928036db..8d54ca551 100644 --- a/2.1-dev/risk/modules/risk_consequences.csv +++ b/2.1-dev/risk/modules/risk_consequences.csv @@ -1,47 +1,46 @@ term,type,iri,label,definition,dpvtype,subclassof,hasbroader,scopenote,created,modified,vocab,namespace AccidentalMisuse,class,https://w3id.org/dpv/risk#AccidentalMisuse,Accidental Misuse,Accidental Misuse,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,,,risk,https://w3id.org/dpv/risk -AuthorisationFailure,class,https://w3id.org/dpv/risk#AuthorisationFailure,Authorisation Failure,Something that acts as or causes Authorisation Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +AuthorisationFailure,class,https://w3id.org/dpv/risk#AuthorisationFailure,Authorisation Failure,Something that acts as or causes Authorisation Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk Benefit,class,https://w3id.org/dpv/risk#Benefit,Benefit,Something that acts as or causes benefits,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2022-03-23,2024-08-16,risk,https://w3id.org/dpv/risk -Blackmail,class,https://w3id.org/dpv/risk#Blackmail,Blackmail,Something that acts as or causes Blackmail,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -BruteForceAuthorisations,class,https://w3id.org/dpv/risk#BruteForceAuthorisations,Brute Force Authorisations,Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -Coercion,class,https://w3id.org/dpv/risk#Coercion,Coercion,Something that acts as or causes Coercion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Blackmail,class,https://w3id.org/dpv/risk#Blackmail,Blackmail,Something that acts as or causes Blackmail,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +BruteForceAuthorisations,class,https://w3id.org/dpv/risk#BruteForceAuthorisations,Brute Force Authorisations,Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Coercion,class,https://w3id.org/dpv/risk#Coercion,Coercion,Something that acts as or causes Coercion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk Compensation,class,https://w3id.org/dpv/risk#Compensation,Compensation,Something that acts as or provides compensation - which can be monetary and financial or in other forms,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk -ComponentFailure,class,https://w3id.org/dpv/risk#ComponentFailure,Component Failure,Something that acts as or causes Component Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk -ComponentMalfunction,class,https://w3id.org/dpv/risk#ComponentMalfunction,Component Malfunction,Something that acts as or causes Component Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk -CompromiseAccount,class,https://w3id.org/dpv/risk#CompromiseAccount,Compromise Account,Something that acts as or causes a compromised account that is then used by the compromiser,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -CompromiseAccountCredentials,class,https://w3id.org/dpv/risk#CompromiseAccountCredentials,Compromise Account Credentials,Something that acts as or causes Account Credentials to be compromised,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -ConfidentialityBreach,class,https://w3id.org/dpv/risk#ConfidentialityBreach,Confidentiality Breach,Something that acts as or causes Confidentiality Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#DataBreach,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ComponentFailure,class,https://w3id.org/dpv/risk#ComponentFailure,Component Failure,Something that acts as or causes Component Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk +ComponentMalfunction,class,https://w3id.org/dpv/risk#ComponentMalfunction,Component Malfunction,Something that acts as or causes Component Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk +CompromiseAccount,class,https://w3id.org/dpv/risk#CompromiseAccount,Compromise Account,Something that acts as or causes a compromised account that is then used by the compromiser,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +CompromiseAccountCredentials,class,https://w3id.org/dpv/risk#CompromiseAccountCredentials,Compromise Account Credentials,Something that acts as or causes Account Credentials to be compromised,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ConfidentialityBreach,class,https://w3id.org/dpv/risk#ConfidentialityBreach,Confidentiality Breach,Something that acts as or causes Confidentiality Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#DataBreach,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk CopyrightViolation,class,https://w3id.org/dpv/risk#CopyrightViolation,Copyright Violation,Something that acts as or causes Copyright Violation,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -Cryptojacking,class,https://w3id.org/dpv/risk#Cryptojacking,Cryptojacking,Something that acts as or causes Cryptojacking,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Cryptojacking,class,https://w3id.org/dpv/risk#Cryptojacking,Cryptojacking,Something that acts as or causes Cryptojacking,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk Damage,class,https://w3id.org/dpv/risk#Damage,Damage,Something that acts as or causes Damage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk -DataBreach,class,https://w3id.org/dpv/risk#DataBreach,Data Breach,Something that acts as or causes Data Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SecurityBreach,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -DataCorruption,class,https://w3id.org/dpv/risk#DataCorruption,Data Corruption,Something that acts as or causes Corruption of Data,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,"This concept was called ""Corruption Data"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -DenialServiceAttack,class,https://w3id.org/dpv/risk#DenialServiceAttack,Denial of Service Attack (DoS),Something that acts as or causes Denial of Service Attack (DoS),https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +DataBreach,class,https://w3id.org/dpv/risk#DataBreach,Data Breach,Something that acts as or causes Data Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#SecurityBreach,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +DataCorruption,class,https://w3id.org/dpv/risk#DataCorruption,Data Corruption,Something that acts as or causes Corruption of Data,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,"This concept was called ""Corruption Data"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +DenialServiceAttack,class,https://w3id.org/dpv/risk#DenialServiceAttack,Denial of Service Attack (DoS),Something that acts as or causes Denial of Service Attack (DoS),https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk Detriment,class,https://w3id.org/dpv/risk#Detriment,Detriment,Something that acts as or causes Detriment,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-03-23,2024-08-16,risk,https://w3id.org/dpv/risk Discrimination,class,https://w3id.org/dpv/risk#Discrimination,Discrimination,Something that acts as or causes Discrimination,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk -DistributedDenialServiceAttack,class,https://w3id.org/dpv/risk#DistributedDenialServiceAttack,Distributed Denial of Service Attack (DDoS),Something that acts as or causes Distributed Denial of Service Attack (DDoS),https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +DistributedDenialServiceAttack,class,https://w3id.org/dpv/risk#DistributedDenialServiceAttack,Distributed Denial of Service Attack (DDoS),Something that acts as or causes Distributed Denial of Service Attack (DDoS),https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk EnvironmentalRisk,class,https://w3id.org/dpv/risk#EnvironmentalRisk,Environmental Risk,Risks and issues that have their origin in environment or can affect the environment at large,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk -EquipmentFailure,class,https://w3id.org/dpv/risk#EquipmentFailure,Equipment Failure,Something that acts as or causes Equipment Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -EquipmentMalfunction,class,https://w3id.org/dpv/risk#EquipmentMalfunction,Equipment Malfunction,Something that acts as or causes Equipment Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +EquipmentFailure,class,https://w3id.org/dpv/risk#EquipmentFailure,Equipment Failure,Something that acts as or causes Equipment Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +EquipmentMalfunction,class,https://w3id.org/dpv/risk#EquipmentMalfunction,Equipment Malfunction,Something that acts as or causes Equipment Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ErroneousSystemUse,class,https://w3id.org/dpv/risk#ErroneousSystemUse,Erroneous System Use,Something that acts as or causes Erroneous System Use,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ExposureToHarmfulSpeech,class,https://w3id.org/dpv/risk#ExposureToHarmfulSpeech,Exposure to Harmful Speech,Something that acts as or causes Harmful Speech,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""HarmfulSpeech"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ExternalSecurityThreat,class,https://w3id.org/dpv/risk#ExternalSecurityThreat,External Security Threat,Concepts associated with security threats that are likely to originate externally,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk -Extorsion,class,https://w3id.org/dpv/risk#Extorsion,Extorsion,Something that acts as or causes Extorsion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Extorsion,class,https://w3id.org/dpv/risk#Extorsion,Extorsion,Something that acts as or causes Extorsion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk Fee,class,https://w3id.org/dpv/risk#Fee,Fee,Something that acts as or provides fees e.g. for using a service,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk FinancialImpact,class,https://w3id.org/dpv/risk#FinancialImpact,Financial Impact,Things that cause or have the potential to impact financial resources,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk FinancialLoss,class,https://w3id.org/dpv/risk#FinancialLoss,Financial Loss,Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -Fraud,class,https://w3id.org/dpv/risk#Fraud,Fraud,Something that acts as or causes Fraud,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Fraud,class,https://w3id.org/dpv/risk#Fraud,Fraud,Something that acts as or causes Fraud,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk Harm,class,https://w3id.org/dpv/risk#Harm,Harm,Something that acts as or causes Harm to humans,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,This concept refers to the general abstract notion of harm,2022-08-13,2024-08-16,risk,https://w3id.org/dpv/risk HumanErrors,class,https://w3id.org/dpv/risk#HumanErrors,Human Errors,Something that acts as or causes Human Errors,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -IdentityFraud,class,https://w3id.org/dpv/risk#IdentityFraud,Identity Fraud,Something that acts as or causes Identity Fraud,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -IdentityTheft,class,https://w3id.org/dpv/risk#IdentityTheft,Identity Theft,Something that acts as or causes Identity Theft,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +IdentityFraud,class,https://w3id.org/dpv/risk#IdentityFraud,Identity Fraud,Something that acts as or causes Identity Fraud,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +IdentityTheft,class,https://w3id.org/dpv/risk#IdentityTheft,Identity Theft,Something that acts as or causes Identity Theft,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk IllegalDataProcessing,class,https://w3id.org/dpv/risk#IllegalDataProcessing,Illegal Data Processing,Something that acts as or causes Illegal Processing of Data,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""IllegalProcessingData"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk IndividualHealthSafety,class,https://w3id.org/dpv/risk#IndividualHealthSafety,Individual Health & Safety,,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,,,risk,https://w3id.org/dpv/risk IndividualRisk,class,https://w3id.org/dpv/risk#IndividualRisk,Individual Risk,Risks and issues that affect or have the potential to affect specific individuals,,,,,,,risk,https://w3id.org/dpv/risk Injury,class,https://w3id.org/dpv/risk#Injury,Injury,Something that acts as or causes Injury,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk IntentionalMisuse,class,https://w3id.org/dpv/risk#IntentionalMisuse,Intentional Misuse,Intentional Misuse,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,,,risk,https://w3id.org/dpv/risk -InterceptCommunications,class,https://w3id.org/dpv/risk#InterceptCommunications,Intercept Communications,Something that acts as or causes Interception of Communications,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,"This concept was called ""InterceptionCommunications"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -InternalSecurityThreat,class,https://w3id.org/dpv/risk#InternalSecurityThreat,Internal Security Threat,Concepts associated with security threats and issues that originate within the organisation,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk +InterceptCommunications,class,https://w3id.org/dpv/risk#InterceptCommunications,Intercept Communications,Something that acts as or causes Interception of Communications,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,"This concept was called ""InterceptionCommunications"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk JudicialCosts,class,https://w3id.org/dpv/risk#JudicialCosts,Judicial Costs,Something that involves or causes judicial costs to be paid,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,,,risk,https://w3id.org/dpv/risk JudicialPenalty,class,https://w3id.org/dpv/risk#JudicialPenalty,Judicial Penalty,Something that involves or causes judicial penalties to be paid,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,,,risk,https://w3id.org/dpv/risk LegalRisk,class,https://w3id.org/dpv/risk#LegalRisk,Legal Risk,Risks and issues that have their basis in legal requirements and enforcement,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk @@ -52,21 +51,21 @@ LoseNegotiatingCapacity,class,https://w3id.org/dpv/risk#LoseNegotiatingCapacity, LoseOpportunity,class,https://w3id.org/dpv/risk#LoseOpportunity,Lose of Opportunity,Something that acts as or causes Loss of Opportunity,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk LoseReputation,class,https://w3id.org/dpv/risk#LoseReputation,Lose of Reputation,Something that acts as or causes Loss of Reputation,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk LoseTrust,class,https://w3id.org/dpv/risk#LoseTrust,Lose of Trust,Something that acts as or causes Loss of Trust,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -MaliciousCodeAttack,class,https://w3id.org/dpv/risk#MaliciousCodeAttack,Malicious Code Attack,Something that acts as or causes Malicious Code Attack,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -MalwareAttack,class,https://w3id.org/dpv/risk#MalwareAttack,Malware Attack,Something that acts as or causes Malware Attack,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +MaliciousCodeAttack,class,https://w3id.org/dpv/risk#MaliciousCodeAttack,Malicious Code Attack,Something that acts as or causes Malicious Code Attack,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +MalwareAttack,class,https://w3id.org/dpv/risk#MalwareAttack,Malware Attack,Something that acts as or causes Malware Attack,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk MaterialDamage,class,https://w3id.org/dpv/risk#MaterialDamage,Material Damage,Something that acts as or causes Material Damage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,The criteria for what is considered material damage is based in jurisdictional laws and norms,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk Misuse,class,https://w3id.org/dpv/risk#Misuse,Misuse,Something that acts as or causes Misuse,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,2024-06-11,2024-08-16,risk,https://w3id.org/dpv/risk NonMaterialDamage,class,https://w3id.org/dpv/risk#NonMaterialDamage,Non-Material Damage,Something that acts as or causes Non-Material Damage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,The criteria for what is considered material damage is based in jurisdictional laws and norms,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk OperationalSecurityRisk,class,https://w3id.org/dpv/risk#OperationalSecurityRisk,Operational Security Risk,Risks and issues that arise during operational processes,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk Payment,class,https://w3id.org/dpv/risk#Payment,Payment,Something that acts as or provides payment e.g. to access a service or purchase resources,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk PersonalSafetyEndangerment,class,https://w3id.org/dpv/risk#PersonalSafetyEndangerment,Personal Safety Endangerment,Something that acts as or causes Personal Safety Endangerment,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -PhishingScam,class,https://w3id.org/dpv/risk#PhishingScam,Phishing Scam,Something that acts as or causes Phishing Scam,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +PhishingScam,class,https://w3id.org/dpv/risk#PhishingScam,Phishing Scam,Something that acts as or causes Phishing Scam,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk PhysicalAssault,class,https://w3id.org/dpv/risk#PhysicalAssault,Physical Assault,Something that acts as or causes Physical Assault,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk PhysicalHarm,class,https://w3id.org/dpv/risk#PhysicalHarm,Physical Harm,,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,,,risk,https://w3id.org/dpv/risk Privacy,class,https://w3id.org/dpv/risk#Privacy,Privacy,,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,,,risk,https://w3id.org/dpv/risk PsychologicalHarm,class,https://w3id.org/dpv/risk#PsychologicalHarm,Psychological Harm,Something that acts as or causes Psychological Harm,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk PublicOrderBreach,class,https://w3id.org/dpv/risk#PublicOrderBreach,Public Order Breach,Something that acts as or causes Public Order Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -Reidentification,class,https://w3id.org/dpv/risk#Reidentification,Re-identification,Something that acts as or causes Re-identification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk +Reidentification,class,https://w3id.org/dpv/risk#Reidentification,Re-identification,Something that acts as or causes Re-identification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk Renumeration,class,https://w3id.org/dpv/risk#Renumeration,Remuneration,Something that acts as or provides renumeration which is in monetary or financial form,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk ReputationalRisk,class,https://w3id.org/dpv/risk#ReputationalRisk,Reputational Risk,Risks and issues that affect the reputation of the organisation,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk Reward,class,https://w3id.org/dpv/risk#Reward,Reward,Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk @@ -74,35 +73,35 @@ RightsExercisePrevention,class,https://w3id.org/dpv/risk#RightsExercisePreventio RightsImpact,class,https://w3id.org/dpv/risk#RightsImpact,Impact to Rights,Something that acts as or causes Impact to Rights,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#Impact;https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""ImpactToRights"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk RightsLimitation,class,https://w3id.org/dpv/risk#RightsLimitation,Limitation of Rights,Something that acts as or causes Limitation of Rights,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""LimitationOfRights"" in DPV 2.0",2022-08-18,2024-08-16,risk,https://w3id.org/dpv/risk RightsViolation,class,https://w3id.org/dpv/risk#RightsViolation,Violation of Rights,Something that acts as or causes Violation of Rights,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""ViolationOfRights"" in DPV 2.0",2022-08-18,2024-08-16,risk,https://w3id.org/dpv/risk -Sabotage,class,https://w3id.org/dpv/risk#Sabotage,Sabotage,Something that acts as or causes Sabotage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -Scam,class,https://w3id.org/dpv/risk#Scam,Scam,Something that acts as or causes Scam,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -SecurityAttack,class,https://w3id.org/dpv/risk#SecurityAttack,Security Attack,Something that acts as or causes an attack on security with the aim of undermining it,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk -SecurityBreach,class,https://w3id.org/dpv/risk#SecurityBreach,Security Breach,Something that acts as or causes Security Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Sabotage,class,https://w3id.org/dpv/risk#Sabotage,Sabotage,Something that acts as or causes Sabotage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Scam,class,https://w3id.org/dpv/risk#Scam,Scam,Something that acts as or causes Scam,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SecurityAttack,class,https://w3id.org/dpv/risk#SecurityAttack,Security Attack,Something that acts as or causes an attack on security with the aim of undermining it,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk +SecurityBreach,class,https://w3id.org/dpv/risk#SecurityBreach,Security Breach,Something that acts as or causes Security Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk SexualViolence,class,https://w3id.org/dpv/risk#SexualViolence,Sexual Violence,Something that acts as or causes Sexual Violence,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk SocialDisadvantage,class,https://w3id.org/dpv/risk#SocialDisadvantage,Social Disadvantage,Something that acts as or causes Social Disadvantage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk SocietalHealthSafety,class,https://w3id.org/dpv/risk#SocietalHealthSafety,Societal Health & Safety,,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,,,risk,https://w3id.org/dpv/risk SocietalRisk,class,https://w3id.org/dpv/risk#SocietalRisk,Societal Risk,Risks and issues that affect or have the potential to affect society at large or specific groups in society,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk -Spoofing,class,https://w3id.org/dpv/risk#Spoofing,Spoofing,Something that acts as or causes Spoofing,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -SystemFailure,class,https://w3id.org/dpv/risk#SystemFailure,System Failure,Something that acts as or causes System Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -SystemIntrusion,class,https://w3id.org/dpv/risk#SystemIntrusion,System Intrusion,Something that acts as or causes System Intrusion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -SystemMalfunction,class,https://w3id.org/dpv/risk#SystemMalfunction,System Malfunction,Something that acts as or causes System Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Spoofing,class,https://w3id.org/dpv/risk#Spoofing,Spoofing,Something that acts as or causes Spoofing,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SystemFailure,class,https://w3id.org/dpv/risk#SystemFailure,System Failure,Something that acts as or causes System Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SystemIntrusion,class,https://w3id.org/dpv/risk#SystemIntrusion,System Intrusion,Something that acts as or causes System Intrusion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SystemMalfunction,class,https://w3id.org/dpv/risk#SystemMalfunction,System Malfunction,Something that acts as or causes System Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk Terrorism,class,https://w3id.org/dpv/risk#Terrorism,Terrorism,Something that acts as or causes Terrorism,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedAccesstoPremises,class,https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises,Unauthorised Access to Premises,Something that acts as or causes Unauthorised Access to Premises,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedActivity,class,https://w3id.org/dpv/risk#UnauthorisedActivity,Unauthorised Activity,Something that acts as or causes Unauthorised Activity,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk -UnauthorisedCodeAccess,class,https://w3id.org/dpv/risk#UnauthorisedCodeAccess,Unauthorised Code Access,Something that acts as or causes Unauthorised Code Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedCodeDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure,Unauthorised Code Disclosure,Something that acts as or causes Unauthorised Code Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedCodeModification,class,https://w3id.org/dpv/risk#UnauthorisedCodeModification,Unauthorised Code Modification,Something that acts as or causes Unauthorised Code Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedDataAccess,class,https://w3id.org/dpv/risk#UnauthorisedDataAccess,Unauthorised Data Access,Something that acts as or causes Unauthorised Data Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedDataDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedDataDisclosure,Unauthorised Data Disclosure,Something that acts as or causes Unauthorised Data Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedDataModification,class,https://w3id.org/dpv/risk#UnauthorisedDataModification,Unauthorised Data Modification,Something that acts as or causes Unauthorised Data Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedInformationDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure,Unauthorised Information Disclosure,Something that acts as or causes Unauthorised Information Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedReidentification,class,https://w3id.org/dpv/risk#UnauthorisedReidentification,Unauthorised Re-Identification,Something that acts as or causes Unauthorised Re-Identification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedResourceUse,class,https://w3id.org/dpv/risk#UnauthorisedResourceUse,Unauthorised Resource Use,Something that acts as or causes Unauthorised Resource Use,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedSystemAccess,class,https://w3id.org/dpv/risk#UnauthorisedSystemAccess,Unauthorised System Access,Something that acts as or causes Unauthorised System Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedSystemModification,class,https://w3id.org/dpv/risk#UnauthorisedSystemModification,Unauthorised System Modification,Something that acts as or causes Unauthorised System Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnwantedCodeDeletion,class,https://w3id.org/dpv/risk#UnwantedCodeDeletion,Unwanted Code Deletion,Something that acts as or causes Unwanted Code Deletion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnwantedDataDeletion,class,https://w3id.org/dpv/risk#UnwantedDataDeletion,Unwanted Data Deletion,Something that acts as or causes Unwanted Data Deletion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnwantedDisclosureData,class,https://w3id.org/dpv/risk#UnwantedDisclosureData,Unwanted Disclosure of Data,Something that acts as or causes Unwanted Disclosure of Data,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedAccesstoPremises,class,https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises,Unauthorised Access to Premises,Something that acts as or causes Unauthorised Access to Premises,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedActivity,class,https://w3id.org/dpv/risk#UnauthorisedActivity,Unauthorised Activity,Something that acts as or causes Unauthorised Activity,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk +UnauthorisedCodeAccess,class,https://w3id.org/dpv/risk#UnauthorisedCodeAccess,Unauthorised Code Access,Something that acts as or causes Unauthorised Code Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedCodeDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure,Unauthorised Code Disclosure,Something that acts as or causes Unauthorised Code Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedCodeModification,class,https://w3id.org/dpv/risk#UnauthorisedCodeModification,Unauthorised Code Modification,Something that acts as or causes Unauthorised Code Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedDataAccess,class,https://w3id.org/dpv/risk#UnauthorisedDataAccess,Unauthorised Data Access,Something that acts as or causes Unauthorised Data Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedDataDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedDataDisclosure,Unauthorised Data Disclosure,Something that acts as or causes Unauthorised Data Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedDataModification,class,https://w3id.org/dpv/risk#UnauthorisedDataModification,Unauthorised Data Modification,Something that acts as or causes Unauthorised Data Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedInformationDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure,Unauthorised Information Disclosure,Something that acts as or causes Unauthorised Information Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedReidentification,class,https://w3id.org/dpv/risk#UnauthorisedReidentification,Unauthorised Re-Identification,Something that acts as or causes Unauthorised Re-Identification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedResourceUse,class,https://w3id.org/dpv/risk#UnauthorisedResourceUse,Unauthorised Resource Use,Something that acts as or causes Unauthorised Resource Use,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedSystemAccess,class,https://w3id.org/dpv/risk#UnauthorisedSystemAccess,Unauthorised System Access,Something that acts as or causes Unauthorised System Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedSystemModification,class,https://w3id.org/dpv/risk#UnauthorisedSystemModification,Unauthorised System Modification,Something that acts as or causes Unauthorised System Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnwantedCodeDeletion,class,https://w3id.org/dpv/risk#UnwantedCodeDeletion,Unwanted Code Deletion,Something that acts as or causes Unwanted Code Deletion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnwantedDataDeletion,class,https://w3id.org/dpv/risk#UnwantedDataDeletion,Unwanted Data Deletion,Something that acts as or causes Unwanted Data Deletion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnwantedDisclosureData,class,https://w3id.org/dpv/risk#UnwantedDisclosureData,Unwanted Disclosure of Data,Something that acts as or causes Unwanted Disclosure of Data,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk UserRisks,class,https://w3id.org/dpv/risk#UserRisks,User Risks,Concepts associated with risks that arise due to User or Human use,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk ViolatingCodeOfConduct,class,https://w3id.org/dpv/risk#ViolatingCodeOfConduct,Violating Code of Conduct,Something that acts as or causes Violation of Code of Conduct,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""ViolationCodeConduct"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ViolatingContractualObligation,class,https://w3id.org/dpv/risk#ViolatingContractualObligation,Violation of Contractual Obligation,Something that acts as or causes Violation of Contractual Obligations,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""ViolationContractualObligations"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk @@ -111,4 +110,3 @@ ViolatingLegalObligation,class,https://w3id.org/dpv/risk#ViolatingLegalObligatio ViolatingPolicy,class,https://w3id.org/dpv/risk#ViolatingPolicy,Violating Policy,Something that acts as or causes violation of policy which can be either internal or external policy,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,,,risk,https://w3id.org/dpv/risk ViolatingStatutoryObligations,class,https://w3id.org/dpv/risk#ViolatingStatutoryObligations,Violation of Statutory Obligations,Something that acts as or causes Violation of Statutory Obligations,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""ViolationStatutoryObligations"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ViolenceAgainstChildren,class,https://w3id.org/dpv/risk#ViolenceAgainstChildren,Violence against children,Something that acts as or causes Child Violence,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,"This concept was called ""ChildViolence"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -VulnerabilityCreated,class,https://w3id.org/dpv/risk#VulnerabilityCreated,Vulnerability Created,Something that acts as or causes Vulnerability Created,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#InternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk diff --git a/2.1-dev/risk/modules/risk_consequences.jsonld b/2.1-dev/risk/modules/risk_consequences.jsonld index cae886467..00f06f02e 100644 --- a/2.1-dev/risk/modules/risk_consequences.jsonld +++ b/2.1-dev/risk/modules/risk_consequences.jsonld @@ -1,6 +1,6 @@ [ { - "@id": "https://w3id.org/dpv/risk#Cryptojacking", + "@id": "https://w3id.org/dpv/risk#NonMaterialDamage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -14,7 +14,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-30" } ], "http://purl.org/dc/terms/modified": [ @@ -23,11 +23,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Neb960f38438d48258bee0ebae96be48e" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -41,13 +36,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Cryptojacking" + "@value": "Something that acts as or causes Non-Material Damage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -58,33 +53,40 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cryptojacking" - } - ] - }, - { - "@id": "_:Neb960f38438d48258bee0ebae96be48e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Landscape 2021" + "@value": "Non-Material Damage" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" + "@language": "en", + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" } ] }, { - "@id": "https://w3id.org/dpv/risk#IntegrityBreach", + "@id": "https://w3id.org/dpv/risk#RightsExercisePrevention", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -98,17 +100,35 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#DataBreach" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Prevent Exercising of Rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Prevent Exercising of Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0" + } ] }, { - "@id": "https://w3id.org/dpv/risk#UnwantedCodeDeletion", + "@id": "https://w3id.org/dpv/risk#SystemFailure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -133,7 +153,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nef681cfae64c43969ff8ef7fdde7753a" + "@id": "_:Nd794c9a0064e4fe6bb3a0ebd38859b9b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -149,13 +169,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Code Deletion" + "@value": "Something that acts as or causes System Failure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -166,28 +189,34 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Code Deletion" + "@value": "System Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here system refers to both hardware and software systems" } ] }, { - "@id": "_:Nef681cfae64c43969ff8ef7fdde7753a", + "@id": "_:Nd794c9a0064e4fe6bb3a0ebd38859b9b", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" } ] }, { - "@id": "https://w3id.org/dpv/risk#IllegalDataProcessing", + "@id": "https://w3id.org/dpv/risk#Reward", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -195,13 +224,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], "http://purl.org/dc/terms/modified": [ @@ -210,11 +239,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N83bd5296b4d94804a73f0e0518c39495" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -228,13 +252,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Illegal Processing of Data" + "@value": "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -245,34 +269,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Illegal Data Processing" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N83bd5296b4d94804a73f0e0518c39495", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Reward" } ] }, { - "@id": "https://w3id.org/dpv/risk#UserRisks", + "@id": "https://w3id.org/dpv/risk#ComponentFailure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -291,13 +293,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Concepts associated with risks that arise due to User or Human use" + "@value": "Something that acts as or causes Component Failure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -308,12 +313,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "User Risks" + "@value": "Component Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure", + "@id": "https://w3id.org/dpv/risk#Harm", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -327,7 +338,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-13" } ], "http://purl.org/dc/terms/modified": [ @@ -336,11 +347,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N540e39aa17014568ba5a2b03534c1f19" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -354,13 +360,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Disclosure" + "@value": "Something that acts as or causes Harm to humans" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -371,28 +377,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Disclosure" - } - ] - }, - { - "@id": "_:N540e39aa17014568ba5a2b03534c1f19", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "Harm" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@language": "en", + "@value": "This concept refers to the general abstract notion of harm" } ] }, { - "@id": "https://w3id.org/dpv/risk#ConfidentialityBreach", + "@id": "https://w3id.org/dpv/risk#ViolatingEthicsCode", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -417,7 +413,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N804ad242900c474395dd117c74dace8e" + "@id": "_:N5971f1bb7e3149b49a4335be11b0926f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -428,18 +424,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#DataBreach" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Confidentiality Breach" + "@value": "Something that acts as or causes Violation of Ethics Code" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -450,12 +446,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confidentiality Breach" + "@value": "Violating Ethics Code" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0" } ] }, { - "@id": "_:N804ad242900c474395dd117c74dace8e", + "@id": "_:N5971f1bb7e3149b49a4335be11b0926f", "@type": [ "https://schema.org/WebPage" ], @@ -471,42 +473,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#Privacy", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Privacy" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#LoseGoodwill", + "@id": "https://w3id.org/dpv/risk#UnwantedCodeDeletion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -531,7 +498,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N4f8237833a8141b2bb3c31cf5176bf42" + "@id": "_:N9b03e23aa8864f4288a1885778e3b1e4" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -547,13 +514,19 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Goodwill" + "@value": "Something that acts as or causes Unwanted Code Deletion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -564,28 +537,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Goodwill" + "@value": "Unwanted Code Deletion" } ] }, { - "@id": "_:N4f8237833a8141b2bb3c31cf5176bf42", + "@id": "_:N9b03e23aa8864f4288a1885778e3b1e4", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingStatutoryObligations", + "@id": "https://w3id.org/dpv/risk#DataCorruption", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -610,7 +583,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb5000792f7ae42ffb4c7efe3b93be7df" + "@id": "_:N8aaec0d1fefb4744abcf3099509b1988" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -626,13 +599,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Statutory Obligations" + "@value": "Something that acts as or causes Corruption of Data" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -643,18 +619,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Statutory Obligations" + "@value": "Data Corruption" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0" + "@value": "This concept was called \"Corruption Data\" in DPV 2.0" } ] }, { - "@id": "_:Nb5000792f7ae42ffb4c7efe3b93be7df", + "@id": "_:N8aaec0d1fefb4744abcf3099509b1988", "@type": [ "https://schema.org/WebPage" ], @@ -670,56 +646,21 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#SocietalHealthSafety", + "@id": "https://w3id.org/dpv/risk#LoseTrust", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Societal Health & Safety" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#Compensation", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -728,6 +669,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N95b0eaaa71714fb48e2d00a428e03220" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -741,13 +687,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms" + "@value": "Something that acts as or causes Loss of Trust" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -758,43 +704,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compensation" + "@value": "Lose of Trust" } ] }, { - "@id": "https://w3id.org/dpv/examples", + "@id": "_:N95b0eaaa71714fb48e2d00a428e03220", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Examples for Data Privacy Vocabulary" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/examples" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "https://schema.org/url": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingEthicsCode", + "@id": "https://w3id.org/dpv/risk#IllegalDataProcessing", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -819,7 +750,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd8ddc1f8024a4418b62c344837cff0cd" + "@id": "_:Nfbea264abf694083a7d1db8b2101092b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -830,7 +761,7 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ @@ -841,7 +772,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Ethics Code" + "@value": "Something that acts as or causes Illegal Processing of Data" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -852,18 +783,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Ethics Code" + "@value": "Illegal Data Processing" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0" + "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0" } ] }, { - "@id": "_:Nd8ddc1f8024a4418b62c344837cff0cd", + "@id": "_:Nfbea264abf694083a7d1db8b2101092b", "@type": [ "https://schema.org/WebPage" ], @@ -879,28 +810,28 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-n3", + "@id": "https://w3id.org/dpv/risk#serialisation-rdf", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://www.w3.org/TeamSubmission/n3/" + "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/text/n3" + "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" } ], "http://purl.org/dc/terms/title": [ { - "@value": "Risk Concepts - N3 serialiation" + "@value": "Risk Concepts - RDF/XML serialiation" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/risk.n3" + "@id": "https://w3id.org/dpv/risk/risk.rdf" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ @@ -910,7 +841,38 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#PersonalSafetyEndangerment", + "@id": "https://w3id.org/dpv/examples", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Examples for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/examples" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Misuse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -918,13 +880,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Delaram Golpayegani" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-06-11" } ], "http://purl.org/dc/terms/modified": [ @@ -933,11 +895,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Na66b6d002d3f448981a58870da1a686e" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -951,13 +908,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Personal Safety Endangerment" + "@value": "Something that acts as or causes Misuse" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -968,28 +925,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Personal Safety Endangerment" - } - ] - }, - { - "@id": "_:Na66b6d002d3f448981a58870da1a686e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage", + "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemAccess", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1003,7 +944,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -1012,6 +953,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6fdf74981d95420a82b9c97acf9aa9eb" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -1025,13 +971,19 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Non-Material Damage" + "@value": "Something that acts as or causes Unauthorised System Access" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1042,18 +994,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Non-Material Damage" + "@value": "Unauthorised System Access" + } + ] + }, + { + "@id": "_:N6fdf74981d95420a82b9c97acf9aa9eb", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#Injury", + "@id": "https://w3id.org/dpv/risk#Coercion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1078,7 +1040,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N1ef56bb9fadb431ba4c270603c7acdec" + "@id": "_:Nc78302d156fb497aae9594fa63bb9fa7" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1094,13 +1056,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Injury" + "@value": "Something that acts as or causes Coercion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1111,28 +1076,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Injury" + "@value": "Coercion" } ] }, { - "@id": "_:N1ef56bb9fadb431ba4c270603c7acdec", + "@id": "_:Nc78302d156fb497aae9594fa63bb9fa7", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk#Misuse", + "@id": "https://w3id.org/dpv/risk#IdentityFraud", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1140,13 +1105,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Delaram Golpayegani" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-06-11" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -1155,6 +1120,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nc74530c53d534886a66e5a7f741398bb" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -1168,13 +1138,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UserRisks" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Misuse" + "@value": "Something that acts as or causes Identity Fraud" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1185,12 +1158,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Misuse" + "@value": "Identity Fraud" } ] }, { - "@id": "https://w3id.org/dpv/risk#Reward", + "@id": "_:Nc74530c53d534886a66e5a7f741398bb", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Threat Taxonomy 2016" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#LoseNegotiatingCapacity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1198,13 +1187,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -1213,6 +1202,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nf8d97cf300cf44d5881be9535d0b1dff" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -1226,13 +1220,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee" + "@value": "Something that acts as or causes Loss of Negotiating Capacity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1243,26 +1237,42 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reward" + "@value": "Lose of Negotiating Capacity" } ] }, { - "@id": "https://w3id.org/dpv/risk#HumanErrors", + "@id": "_:Nf8d97cf300cf44d5881be9535d0b1dff", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#SocialDisadvantage", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-19" } ], "http://purl.org/dc/terms/modified": [ @@ -1271,11 +1281,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N7d9296887d1d4b6ea986d2ad6579a1ec" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -1289,13 +1294,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UserRisks" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Human Errors" + "@value": "Something that acts as or causes Social Disadvantage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1306,28 +1311,47 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Human Errors" + "@value": "Social Disadvantage" } ] }, { - "@id": "_:N7d9296887d1d4b6ea986d2ad6579a1ec", + "@id": "https://w3id.org/dpv/risk#PhysicalHarm", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@id": "https://w3id.org/dpv/risk#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#IndividualRisk" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Physical Harm" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises", + "@id": "https://w3id.org/dpv/risk#Reidentification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1341,7 +1365,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-19" } ], "http://purl.org/dc/terms/modified": [ @@ -1350,11 +1374,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N2b8ae4e96b21406bb91bfdec8f460776" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -1368,13 +1387,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Access to Premises" + "@value": "Something that acts as or causes Re-identification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1385,54 +1407,57 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Access to Premises" - } - ] - }, - { - "@id": "_:N2b8ae4e96b21406bb91bfdec8f460776", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Re-identification" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseCustomerConfidence", + "@id": "https://w3id.org/dpv/risk#Privacy", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "_:N0d138f94265e46f293490fbe0fc8074c" + "@language": "en", + "@value": "Privacy" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#LegalRisk", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -1447,13 +1472,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Customer Confidence" + "@value": "Risks and issues that have their basis in legal requirements and enforcement" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1464,28 +1489,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Customer Confidence" - } - ] - }, - { - "@id": "_:N0d138f94265e46f293490fbe0fc8074c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Legal Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#EquipmentMalfunction", + "@id": "https://w3id.org/dpv/risk#SystemIntrusion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1510,7 +1519,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N7f1dc230141c4448a99f28f362191020" + "@id": "_:Ne8bd9725515e46d0a941f4a4665a7868" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1526,13 +1535,22 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Equipment Malfunction" + "@value": "Something that acts as or causes System Intrusion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1543,34 +1561,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Equipment Malfunction" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here equipment refers to physical equipment" + "@value": "System Intrusion" } ] }, { - "@id": "_:N7f1dc230141c4448a99f28f362191020", + "@id": "_:Ne8bd9725515e46d0a941f4a4665a7868", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedResourceUse", + "@id": "https://w3id.org/dpv/risk#Spoofing", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1595,7 +1607,10 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd4175f97fd33423f9014c3d690d56fad" + "@id": "_:N539160303302464aa341bdfa53068f22" + }, + { + "@id": "_:N0085b3ac0b474cf1a64eccdff3718c8d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1610,14 +1625,23 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Resource Use" + "@value": "Something that acts as or causes Spoofing" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1628,12 +1652,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Resource Use" + "@value": "Spoofing" } ] }, { - "@id": "_:Nd4175f97fd33423f9014c3d690d56fad", + "@id": "_:N539160303302464aa341bdfa53068f22", "@type": [ "https://schema.org/WebPage" ], @@ -1649,7 +1673,23 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedDataDisclosure", + "@id": "_:N0085b3ac0b474cf1a64eccdff3718c8d", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1674,7 +1714,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nf415d60c8c8849ba95e5611d481b06ce" + "@id": "_:N7487c570f8f54358874e08fa38c8f27d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1689,6 +1729,15 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -1696,7 +1745,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Disclosure" + "@value": "Something that acts as or causes Unauthorised Access to Premises" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1707,12 +1756,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Disclosure" + "@value": "Unauthorised Access to Premises" } ] }, { - "@id": "_:Nf415d60c8c8849ba95e5611d481b06ce", + "@id": "_:N7487c570f8f54358874e08fa38c8f27d", "@type": [ "https://schema.org/WebPage" ], @@ -1728,7 +1777,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#Coercion", + "@id": "https://w3id.org/dpv/risk#Discrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1736,13 +1785,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-19" } ], "http://purl.org/dc/terms/modified": [ @@ -1751,11 +1800,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N61513676426149faae9e58063eb667d8" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -1769,13 +1813,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Coercion" + "@value": "Something that acts as or causes Discrimination" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1786,28 +1830,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Coercion" - } - ] - }, - { - "@id": "_:N61513676426149faae9e58063eb667d8", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#RightsViolation", + "@id": "https://w3id.org/dpv/risk#Compensation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1821,7 +1849,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-04-14" } ], "http://purl.org/dc/terms/modified": [ @@ -1843,13 +1871,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Rights" + "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1860,18 +1888,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0" + "@value": "Compensation" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolenceAgainstChildren", + "@id": "https://w3id.org/dpv/risk#LoseCustomerConfidence", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1896,7 +1918,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb34535276ddd4a56ac18dcc8fc489cbb" + "@id": "_:N669b51dd9b0f4a71983f16dfc274956a" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1912,13 +1934,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Child Violence" + "@value": "Something that acts as or causes Loss of Customer Confidence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1929,34 +1951,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violence against children" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ChildViolence\" in DPV 2.0" + "@value": "Lose of Customer Confidence" } ] }, { - "@id": "_:Nb34535276ddd4a56ac18dcc8fc489cbb", + "@id": "_:N669b51dd9b0f4a71983f16dfc274956a", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#RightsLimitation", + "@id": "https://w3id.org/dpv/risk#HumanErrors", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1964,13 +1980,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -1979,6 +1995,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Na882c52257364f5896e5b38b50bb08fe" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -1992,13 +2013,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Limitation of Rights" + "@value": "Something that acts as or causes Human Errors" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2009,18 +2030,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Limitation of Rights" + "@value": "Human Errors" } + ] + }, + { + "@id": "_:Na882c52257364f5896e5b38b50bb08fe", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#DistributedDenialServiceAttack", + "@id": "https://w3id.org/dpv/risk#Injury", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2045,7 +2076,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N842f6dd3b92c482180f56ce6a495c382" + "@id": "_:Na6c5e17bb8ac4135b62412f66dd88460" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2061,13 +2092,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Distributed Denial of Service Attack (DDoS)" + "@value": "Something that acts as or causes Injury" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2078,12 +2109,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Distributed Denial of Service Attack (DDoS)" + "@value": "Injury" } ] }, { - "@id": "_:N842f6dd3b92c482180f56ce6a495c382", + "@id": "_:Na6c5e17bb8ac4135b62412f66dd88460", "@type": [ "https://schema.org/WebPage" ], @@ -2099,7 +2130,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedDataAccess", + "@id": "https://w3id.org/dpv/risk#ViolatingStatutoryObligations", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2124,7 +2155,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nc799e152712d4ee48d59c2a1366fca7f" + "@id": "_:Ne3511d0b904a403e93b1538888ad1023" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2135,18 +2166,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Access" + "@value": "Something that acts as or causes Violation of Statutory Obligations" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2157,69 +2188,34 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Access" - } - ] - }, - { - "@id": "_:Nc799e152712d4ee48d59c2a1366fca7f", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "Violation of Statutory Obligations" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@language": "en", + "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk#JudicialPenalty", + "@id": "_:Ne3511d0b904a403e93b1538888ad1023", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that involves or causes judicial penalties to be paid" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Judicial Penalty" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemAccess", + "@id": "https://w3id.org/dpv/risk#RightsImpact", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2244,7 +2240,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N4387faf4bb854435bfdc47ebf666782a" + "@id": "_:N7b552ef83c274f84b167cc68c23676bb" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2260,13 +2256,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" + }, + { + "@id": "https://w3id.org/dpv#Impact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised System Access" + "@value": "Something that acts as or causes Impact to Rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2277,12 +2276,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised System Access" + "@value": "Impact to Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ImpactToRights\" in DPV 2.0" } ] }, { - "@id": "_:N4387faf4bb854435bfdc47ebf666782a", + "@id": "_:N7b552ef83c274f84b167cc68c23676bb", "@type": [ "https://schema.org/WebPage" ], @@ -2298,33 +2303,46 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#SecurityBreach", + "@id": "https://w3id.org/dpv/risk#IndividualHealthSafety", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "_:Nee086e9da9f643e2837c115c27f1cabc" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Individual Health & Safety" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ReputationalRisk", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -2339,13 +2357,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Security Breach" + "@value": "Risks and issues that affect the reputation of the organisation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2356,55 +2374,17 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Security Breach" - } - ] - }, - { - "@id": "_:Nee086e9da9f643e2837c115c27f1cabc", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Reputational Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#SexualViolence", + "@id": "https://w3id.org/dpv/risk#ViolatingPolicy", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nbeddee22b7a841e39879764ab63949f8" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -2418,13 +2398,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Sexual Violence" + "@value": "Something that acts as or causes violation of policy which can be either internal or external policy" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2435,28 +2415,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sexual Violence" - } - ] - }, - { - "@id": "_:Nbeddee22b7a841e39879764ab63949f8", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Violating Policy" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemModification", + "@id": "https://w3id.org/dpv/risk#InterceptCommunications", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2481,7 +2445,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0c47798cd08a44d790a99ee3c58dcfb9" + "@id": "_:N1f36b972c50f49fb9b474152b57cf474" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2492,10 +2456,13 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -2503,7 +2470,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised System Modification" + "@value": "Something that acts as or causes Interception of Communications" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2514,54 +2481,79 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised System Modification" + "@value": "Intercept Communications" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0" } ] }, { - "@id": "_:N0c47798cd08a44d790a99ee3c58dcfb9", + "@id": "_:N1f36b972c50f49fb9b474152b57cf474", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnwantedDataDeletion", + "@id": "https://w3id.org/dpv/risk#JudicialPenalty", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that involves or causes judicial penalties to be paid" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "_:N7ff2bed0d152400e90aff3c52f1320b0" + "@language": "en", + "@value": "Judicial Penalty" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#AccidentalMisuse", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -2576,13 +2568,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Data Deletion" + "@value": "Accidental Misuse" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2593,28 +2585,53 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Data Deletion" + "@value": "Accidental Misuse" } ] }, { - "@id": "_:N7ff2bed0d152400e90aff3c52f1320b0", + "@id": "https://w3id.org/dpv/risk#EnvironmentalRisk", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv#RiskConcept" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Risks and issues that have their origin in environment or can affect the environment at large" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Environmental Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#Spoofing", + "@id": "https://w3id.org/dpv/risk#Extorsion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2639,10 +2656,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N603a4b8fadf24d23ac9c224927644c9d" - }, - { - "@id": "_:N698cebdfba864777b23d25052c4d2493" + "@id": "_:N78e6085a5a4a4a08adbcdb4af46722d9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2658,16 +2672,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" }, { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Spoofing" + "@value": "Something that acts as or causes Extorsion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2678,44 +2692,89 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Spoofing" + "@value": "Extorsion" } ] }, { - "@id": "_:N603a4b8fadf24d23ac9c224927644c9d", + "@id": "_:N78e6085a5a4a4a08adbcdb4af46722d9", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "_:N698cebdfba864777b23d25052c4d2493", + "@id": "https://w3id.org/dpv/risk#UnauthorisedReidentification", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Georg P. Krog" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-19" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Unauthorised Re-Identification" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Unauthorised Re-Identification" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExposureToHarmfulSpeech", + "@id": "https://w3id.org/dpv/risk#ConfidentialityBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2740,7 +2799,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ne595b225e5ee4cc2b2374256ef05fa2e" + "@id": "_:N0571680fc6554da2a384a2e851d510c0" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2756,13 +2815,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#DataBreach" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Harmful Speech" + "@value": "Something that acts as or causes Confidentiality Breach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2773,70 +2835,96 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Exposure to Harmful Speech" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0" + "@value": "Confidentiality Breach" } ] }, { - "@id": "_:Ne595b225e5ee4cc2b2374256ef05fa2e", + "@id": "_:N0571680fc6554da2a384a2e851d510c0", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/guides", + "@id": "https://w3id.org/dpv/risk#FinancialImpact", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.w3.org/TR/html/" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@value": "Guides for Data Privacy Vocabulary" + "@id": "https://w3id.org/dpv#RiskConcept" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/guides" + "@language": "en", + "@value": "Things that cause or have the potential to impact financial resources" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Financial Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk#InternalSecurityThreat", + "@id": "https://w3id.org/dpv/risk#Terrorism", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N84e706a33b7c462194d2c8fb5c04326c" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -2850,13 +2938,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Concepts associated with security threats and issues that originate within the organisation" + "@value": "Something that acts as or causes Terrorism" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2867,79 +2955,134 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Internal Security Threat" + "@value": "Terrorism" } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-ttl", + "@id": "_:N84e706a33b7c462194d2c8fb5c04326c", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/conformsTo": [ + "https://schema.org/name": [ { - "@id": "https://www.w3.org/TR/turtle/" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/format": [ + "https://schema.org/url": [ { - "@id": "https://www.iana.org/assignments/media-types/text/turtle" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#PublicOrderBreach", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/title": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "Risk Concepts - Turtle serialiation" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk/risk.ttl" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-jsonld", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://www.w3.org/TR/json-ld11/" + "@id": "_:N1d102af8ecd94ce3a875a9a2a7e78bcc" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.iana.org/assignments/media-types/application/ld+json" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "Risk Concepts - JSON-LD serialiation" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk/risk.jsonld" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@language": "en", + "@value": "Something that acts as or causes Public Order Breach" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Public Order Breach" } ] }, { - "@id": "https://w3id.org/dpv/risk#LegalRisk", + "@id": "_:N1d102af8ecd94ce3a875a9a2a7e78bcc", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#UnwantedDataDeletion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nde382e9a51c445d69476b298827b1cbe" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -2953,13 +3096,19 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that have their basis in legal requirements and enforcement" + "@value": "Something that acts as or causes Unwanted Data Deletion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2970,12 +3119,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Legal Risk" + "@value": "Unwanted Data Deletion" } ] }, { - "@id": "https://w3id.org/dpv/risk#SystemFailure", + "@id": "_:Nde382e9a51c445d69476b298827b1cbe", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ErroneousSystemUse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3000,7 +3165,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ndb0e0e85d6ad4dabbf9efc7a0f2cb59a" + "@id": "_:N258e312c37aa4354bed73603ef7a36f6" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3016,13 +3181,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Failure" + "@value": "Something that acts as or causes Erroneous System Use" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3033,34 +3198,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Failure" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here system refers to both hardware and software systems" + "@value": "Erroneous System Use" } ] }, { - "@id": "_:Ndb0e0e85d6ad4dabbf9efc7a0f2cb59a", + "@id": "_:N258e312c37aa4354bed73603ef7a36f6", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeModification", + "@id": "https://w3id.org/dpv/risk#Cryptojacking", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3085,7 +3244,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N8ae12eb2b96a4c7e97a8739ee00ffe80" + "@id": "_:N3adf839933da482c89a2828fc9743969" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3100,6 +3259,9 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -3107,7 +3269,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Modification" + "@value": "Something that acts as or causes Cryptojacking" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3118,33 +3280,56 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Modification" + "@value": "Cryptojacking" } ] }, { - "@id": "_:N8ae12eb2b96a4c7e97a8739ee00ffe80", + "@id": "_:N3adf839933da482c89a2828fc9743969", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ENISA Threat Landscape 2021" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" } ] }, { - "@id": "https://w3id.org/dpv/risk#JudicialCosts", + "@id": "https://w3id.org/dpv/risk#Fee", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-04-14" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "DGA 2.10" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -3153,7 +3338,7 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ @@ -3164,7 +3349,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that involves or causes judicial costs to be paid" + "@value": "Something that acts as or provides fees e.g. for using a service" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3175,12 +3360,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Judicial Costs" + "@value": "Fee" } ] }, { - "@id": "https://w3id.org/dpv/risk#PublicOrderBreach", + "@id": "https://w3id.org/dpv/risk#LoseCredibility", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3205,7 +3390,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N2bd2812bbacb46319d2bdb0e95e02f65" + "@id": "_:N2c068c379d9b4c2b8da0937ad8be6a81" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3221,13 +3406,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Public Order Breach" + "@value": "Something that acts as or causes Loss of Credibility" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3238,12 +3423,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Public Order Breach" + "@value": "Lose of Credibility" } ] }, { - "@id": "_:N2bd2812bbacb46319d2bdb0e95e02f65", + "@id": "_:N2c068c379d9b4c2b8da0937ad8be6a81", "@type": [ "https://schema.org/WebPage" ], @@ -3259,7 +3444,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#MaterialDamage", + "@id": "https://w3id.org/dpv/risk#ViolatingLegalObligation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3273,7 +3458,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -3282,6 +3467,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N0b5dd4cc254540f49140434e86708abb" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -3290,7 +3480,7 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ @@ -3301,7 +3491,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Material Damage" + "@value": "Something that acts as or causes Violation of Legal Obligations" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3312,18 +3502,34 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Material Damage" + "@value": "Violation of Legal Obligations" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" + "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk#DataCorruption", + "@id": "_:N0b5dd4cc254540f49140434e86708abb", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#FinancialLoss", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3348,7 +3554,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ncd7b81f0daef4263a47284ebb48b83f6" + "@id": "_:N698d6b9272804e2dba685b14f6e69152" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3359,18 +3565,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Corruption of Data" + "@value": "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3381,18 +3587,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Corruption" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"Corruption Data\" in DPV 2.0" + "@value": "Financial Loss" } ] }, { - "@id": "_:Ncd7b81f0daef4263a47284ebb48b83f6", + "@id": "_:N698d6b9272804e2dba685b14f6e69152", "@type": [ "https://schema.org/WebPage" ], @@ -3408,66 +3608,35 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-rdf", + "@id": "https://w3id.org/dpv/risk#ExposureToHarmfulSpeech", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/title": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "Risk Concepts - RDF/XML serialiation" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/risk/risk.rdf" + "@id": "_:N95f46ba999c74717949420ed05a75570" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#CompromiseAccountCredentials", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nf877665a169e4a7eac29964fc15db245" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" } @@ -3480,13 +3649,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Account Credentials to be compromised" + "@value": "Something that acts as or causes Harmful Speech" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3497,12 +3666,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account Credentials" + "@value": "Exposure to Harmful Speech" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0" } ] }, { - "@id": "_:Nf877665a169e4a7eac29964fc15db245", + "@id": "_:N95f46ba999c74717949420ed05a75570", "@type": [ "https://schema.org/WebPage" ], @@ -3518,48 +3693,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv#RiskConcept" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Risks and issues that affect the reputation of the organisation" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Reputational Risk" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeAccess", + "@id": "https://w3id.org/dpv/risk#SystemMalfunction", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3584,7 +3718,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N8193907d23bd43dc8b146573989b8a0d" + "@id": "_:N18aeaa08367a4c56822793249e34feae" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3600,13 +3734,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Access" + "@value": "Something that acts as or causes System Malfunction" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3617,28 +3754,34 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Access" + "@value": "System Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here system refers to both hardware and software systems" } ] }, { - "@id": "_:N8193907d23bd43dc8b146573989b8a0d", + "@id": "_:N18aeaa08367a4c56822793249e34feae", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#AuthorisationFailure", + "@id": "https://w3id.org/dpv/risk#SecurityBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3663,7 +3806,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N8906a1d2a7bd4484854e88a2dc1b93a5" + "@id": "_:Nb3034bc7cf1e485b85582c21529ebaa4" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3678,6 +3821,15 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, { "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } @@ -3685,7 +3837,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Authorisation Failure" + "@value": "Something that acts as or causes Security Breach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3696,34 +3848,60 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Authorisation Failure" + "@value": "Security Breach" } ] }, { - "@id": "_:N8906a1d2a7bd4484854e88a2dc1b93a5", + "@id": "_:Nb3034bc7cf1e485b85582c21529ebaa4", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISa Trust Services Security Incidents 2021" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes", + "@id": "https://w3id.org/dpv/risk#IntegrityBreach", "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#DataBreach" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } ] }, { - "@id": "https://w3id.org/dpv/risk#SystemMalfunction", + "@id": "https://w3id.org/dpv/risk#ViolenceAgainstChildren", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3748,7 +3926,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N1c2325e64024454ebc2e79f9e388cf3b" + "@id": "_:N50def33314ee4442bf7e77161e51165b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3764,13 +3942,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Malfunction" + "@value": "Something that acts as or causes Child Violence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3781,56 +3959,39 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Malfunction" + "@value": "Violence against children" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Here system refers to both hardware and software systems" + "@value": "This concept was called \"ChildViolence\" in DPV 2.0" } ] }, { - "@id": "_:N1c2325e64024454ebc2e79f9e388cf3b", + "@id": "_:N50def33314ee4442bf7e77161e51165b", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#SocialDisadvantage", + "@id": "https://w3id.org/dpv/risk#SocietalRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -3844,13 +4005,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Social Disadvantage" + "@value": "Risks and issues that affect or have the potential to affect society at large or specific groups in society" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3861,12 +4022,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Social Disadvantage" + "@value": "Societal Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#Reidentification", + "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeModification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3880,7 +4041,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -3889,6 +4050,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Ncecbd81981b3460f9cede6031d4ab8b1" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -3902,13 +4068,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Re-identification" + "@value": "Something that acts as or causes Unauthorised Code Modification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3919,18 +4088,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Re-identification" + "@value": "Unauthorised Code Modification" + } + ] + }, + { + "@id": "_:Ncecbd81981b3460f9cede6031d4ab8b1", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#Damage", + "@id": "https://w3id.org/dpv/risk#UnauthorisedResourceUse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3944,7 +4123,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -3953,6 +4132,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N605e2cac18a74200ab14cc33e319b6cb" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -3966,13 +4150,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Damage" + "@value": "Something that acts as or causes Unauthorised Resource Use" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3983,37 +4170,75 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Damage" + "@value": "Unauthorised Resource Use" } ] }, { - "@id": "https://w3id.org/dpv/risk#SecurityAttack", + "@id": "_:N605e2cac18a74200ab14cc33e319b6cb", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "accepted" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "https://schema.org/url": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#LoseGoodwill", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N194bc10f01ef4bdb99f12487816e6826" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes an attack on security with the aim of undermining it" + "@value": "Something that acts as or causes Loss of Goodwill" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4024,43 +4249,78 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Security Attack" + "@value": "Lose of Goodwill" } ] }, { - "@id": "https://w3id.org/dpv/primer", + "@id": "_:N194bc10f01ef4bdb99f12487816e6826", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/conformsTo": [ + "https://schema.org/name": [ { - "@id": "https://www.w3.org/TR/html/" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/format": [ + "https://schema.org/url": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ComponentMalfunction", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "Primer for Data Privacy Vocabulary" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/primer" + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@language": "en", + "@value": "Something that acts as or causes Component Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Component Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of" } ] }, { - "@id": "https://w3id.org/dpv/risk#Fraud", + "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemModification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4085,7 +4345,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd4dde0f0f01e4d739b22630aa8ad7d7a" + "@id": "_:N029a97b214024c18a899586cb3864d2a" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4100,6 +4360,9 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -4107,7 +4370,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Fraud" + "@value": "Something that acts as or causes Unauthorised System Modification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4118,28 +4381,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Fraud" + "@value": "Unauthorised System Modification" } ] }, { - "@id": "_:Nd4dde0f0f01e4d739b22630aa8ad7d7a", + "@id": "_:N029a97b214024c18a899586cb3864d2a", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#SystemIntrusion", + "@id": "https://w3id.org/dpv/risk#Sabotage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4164,7 +4427,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N7a5848cbabb14c8ea2d162432eba32f0" + "@id": "_:N2fc72d8ce45943bcaad06c0a96aac629" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4179,6 +4442,12 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -4186,7 +4455,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Intrusion" + "@value": "Something that acts as or causes Sabotage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4197,12 +4466,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Intrusion" + "@value": "Sabotage" } ] }, { - "@id": "_:N7a5848cbabb14c8ea2d162432eba32f0", + "@id": "_:N2fc72d8ce45943bcaad06c0a96aac629", "@type": [ "https://schema.org/WebPage" ], @@ -4218,7 +4487,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#DenialServiceAttack", + "@id": "https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4243,10 +4512,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N51a29309d655420e8611a50e7d2baa7c" - }, - { - "@id": "_:Nf82ac345e0fe44a394f7da0ec78ef801" + "@id": "_:N89971235b5e34930a94f46c696e0ac94" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4261,6 +4527,9 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -4268,7 +4537,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Denial of Service Attack (DoS)" + "@value": "Something that acts as or causes Unauthorised Information Disclosure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4279,48 +4548,54 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Denial of Service Attack (DoS)" + "@value": "Unauthorised Information Disclosure" } ] }, { - "@id": "_:N51a29309d655420e8611a50e7d2baa7c", + "@id": "_:N89971235b5e34930a94f46c696e0ac94", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "_:Nf82ac345e0fe44a394f7da0ec78ef801", + "@id": "https://w3id.org/dpv/risk#SexualViolence", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Ncb4b4f28b9894b79bfd2a5d2dd41f88f" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#EnvironmentalRisk", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -4335,13 +4610,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that have their origin in environment or can affect the environment at large" + "@value": "Something that acts as or causes Sexual Violence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4352,12 +4627,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Environmental Risk" + "@value": "Sexual Violence" } ] }, { - "@id": "https://w3id.org/dpv/risk#MalwareAttack", + "@id": "_:Ncb4b4f28b9894b79bfd2a5d2dd41f88f", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#AuthorisationFailure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4382,7 +4673,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N933b42794d4f41a39ee17bc9b20bf774" + "@id": "_:N588812d3250243469d4d5b0cbd82dc9e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4398,13 +4689,19 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Malware Attack" + "@value": "Something that acts as or causes Authorisation Failure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4415,28 +4712,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Malware Attack" + "@value": "Authorisation Failure" } ] }, { - "@id": "_:N933b42794d4f41a39ee17bc9b20bf774", + "@id": "_:N588812d3250243469d4d5b0cbd82dc9e", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ENISa Trust Services Security Incidents 2021" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-html", + "@id": "https://w3id.org/dpv/primer", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], @@ -4452,51 +4749,53 @@ ], "http://purl.org/dc/terms/title": [ { - "@value": "Risk Concepts - HTML serialiation" + "@value": "Primer for Data Privacy Vocabulary" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/risk.html" + "@id": "https://w3id.org/dpv/primer" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/specification" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk#AvailabilityBreach", + "@id": "https://w3id.org/dpv/guides", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://www.w3.org/TR/html/" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/format": [ { - "@language": "en", - "@value": "accepted" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/dc/terms/title": [ { - "@id": "https://w3id.org/dpv/risk#DataBreach" + "@value": "Guides for Data Privacy Vocabulary" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/guides" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk#Harm", + "@id": "https://w3id.org/dpv/risk#CopyrightViolation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4510,7 +4809,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-13" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -4519,6 +4818,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N3984b17b1694455793b94c3ad850178d" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -4532,13 +4836,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Harm to humans" + "@value": "Something that acts as or causes Copyright Violation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4549,18 +4853,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Harm" + "@value": "Copyright Violation" } + ] + }, + { + "@id": "_:N3984b17b1694455793b94c3ad850178d", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "This concept refers to the general abstract notion of harm" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingContractualObligation", + "@id": "https://w3id.org/dpv/risk#EquipmentMalfunction", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4585,7 +4899,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N1802c2900f5b4c578896c91c3149381d" + "@id": "_:N53bfad5db8324151841ce01472d06f41" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4596,18 +4910,21 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Contractual Obligations" + "@value": "Something that acts as or causes Equipment Malfunction" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4618,18 +4935,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Contractual Obligation" + "@value": "Equipment Malfunction" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0" + "@value": "Here equipment refers to physical equipment" } ] }, { - "@id": "_:N1802c2900f5b4c578896c91c3149381d", + "@id": "_:N53bfad5db8324151841ce01472d06f41", "@type": [ "https://schema.org/WebPage" ], @@ -4645,7 +4962,39 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#Extorsion", + "@id": "https://w3id.org/dpv/risk#AvailabilityBreach", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#DataBreach" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedDataDisclosure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4670,7 +5019,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N40f94dff19814aa6ae7d3074eb3409d8" + "@id": "_:N7c66233cabb64c2486ae612a1ff6b01d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4685,6 +5034,9 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -4692,7 +5044,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Extorsion" + "@value": "Something that acts as or causes Unauthorised Data Disclosure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4703,28 +5055,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extorsion" + "@value": "Unauthorised Data Disclosure" } ] }, { - "@id": "_:N40f94dff19814aa6ae7d3074eb3409d8", + "@id": "_:N7c66233cabb64c2486ae612a1ff6b01d", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#IndividualHealthSafety", + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4743,7 +5095,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv#RiskConcept" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Risks and issues that arise during operational processes" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4754,12 +5112,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Individual Health & Safety" + "@value": "Operational Security Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#PsychologicalHarm", + "@id": "https://w3id.org/dpv/risk#UnauthorisedDataModification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4784,7 +5142,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N903ec696d7504183af4ba63f3f295e8e" + "@id": "_:Nb76ee4ad00614561b02ea8b1fd3da77c" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4800,13 +5158,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Psychological Harm" + "@value": "Something that acts as or causes Unauthorised Data Modification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4817,12 +5178,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Psychological Harm" + "@value": "Unauthorised Data Modification" } ] }, { - "@id": "_:N903ec696d7504183af4ba63f3f295e8e", + "@id": "_:Nb76ee4ad00614561b02ea8b1fd3da77c", "@type": [ "https://schema.org/WebPage" ], @@ -4838,7 +5199,38 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#PhysicalAssault", + "@id": "https://w3id.org/dpv/risk#serialisation-jsonld", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/json-ld11/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/application/ld+json" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - JSON-LD serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.jsonld" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#LoseReputation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4863,7 +5255,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N4414613afa8c4456b9a9b6c3f17a7a0c" + "@id": "_:N90d89ca8a8594ecabee31205aee25395" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4879,13 +5271,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Physical Assault" + "@value": "Something that acts as or causes Loss of Reputation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4896,12 +5288,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Physical Assault" + "@value": "Lose of Reputation" } ] }, { - "@id": "_:N4414613afa8c4456b9a9b6c3f17a7a0c", + "@id": "_:N90d89ca8a8594ecabee31205aee25395", "@type": [ "https://schema.org/WebPage" ], @@ -4917,7 +5309,13 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure", + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeAccess", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4942,7 +5340,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb2d6659136cf4d2fa881ae5798bf0e58" + "@id": "_:N99568e0cd3774d348d85262f04bc3a0b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4957,6 +5355,12 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -4964,7 +5368,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Information Disclosure" + "@value": "Something that acts as or causes Unauthorised Code Access" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4975,28 +5379,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Information Disclosure" + "@value": "Unauthorised Code Access" } ] }, { - "@id": "_:Nb2d6659136cf4d2fa881ae5798bf0e58", + "@id": "_:N99568e0cd3774d348d85262f04bc3a0b", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#RightsImpact", + "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -5021,7 +5425,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N4e0b95db2d414e7588f607d2edf6902e" + "@id": "_:Nc4c391b305be479eb0e623d887a478ac" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5037,16 +5441,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" }, { - "@id": "https://w3id.org/dpv#Impact" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Impact to Rights" + "@value": "Something that acts as or causes Unauthorised Code Disclosure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5057,34 +5461,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Impact to Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ImpactToRights\" in DPV 2.0" + "@value": "Unauthorised Code Disclosure" } ] }, { - "@id": "_:N4e0b95db2d414e7588f607d2edf6902e", + "@id": "_:Nc4c391b305be479eb0e623d887a478ac", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#DataBreach", + "@id": "https://w3id.org/dpv/risk#DistributedDenialServiceAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -5109,15 +5507,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N82834c9f1ecf4644ab2d9343a1169c62" - } - ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples#E0069" - }, - { - "@id": "https://w3id.org/dpv/examples#E0071" + "@id": "_:N64ebcf10636d495599fc0fd262e44103" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5133,13 +5523,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SecurityBreach" + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Data Breach" + "@value": "Something that acts as or causes Distributed Denial of Service Attack (DDoS)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5150,12 +5543,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Breach" + "@value": "Distributed Denial of Service Attack (DDoS)" } ] }, { - "@id": "_:N82834c9f1ecf4644ab2d9343a1169c62", + "@id": "_:N64ebcf10636d495599fc0fd262e44103", "@type": [ "https://schema.org/WebPage" ], @@ -5171,29 +5564,12 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#RightsExercisePrevention", + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -5207,13 +5583,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Prevent Exercising of Rights" + "@value": "Concepts associated with security threats that are likely to originate externally" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5224,18 +5600,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Prevent Exercising of Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0" + "@value": "External Security Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk#Detriment", + "@id": "https://w3id.org/dpv/risk#PhishingScam", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -5243,13 +5613,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -5258,6 +5628,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nb657a11b610f419a86eb9ea4a94e7e37" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -5271,13 +5646,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Detriment" + "@value": "Something that acts as or causes Phishing Scam" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5288,37 +5666,48 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Detriment" + "@value": "Phishing Scam" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseReputation", + "@id": "_:Nb657a11b610f419a86eb9ea4a94e7e37", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" } ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Damage", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-03-30" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:N0282f3114f5b4278b632620b9b954c7d" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5334,13 +5723,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Reputation" + "@value": "Something that acts as or causes Damage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5351,28 +5740,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Reputation" - } - ] - }, - { - "@id": "_:N0282f3114f5b4278b632620b9b954c7d", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Damage" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingCodeOfConduct", + "@id": "https://w3id.org/dpv/risk#Renumeration", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -5380,13 +5753,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], "http://purl.org/dc/terms/modified": [ @@ -5395,11 +5768,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N3d2e8d97024142dca7a47b73cbb8097c" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -5408,18 +5776,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Code of Conduct" + "@value": "Something that acts as or provides renumeration which is in monetary or financial form" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5430,34 +5798,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Code of Conduct" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N3d2e8d97024142dca7a47b73cbb8097c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Remuneration" } ] }, { - "@id": "https://w3id.org/dpv/risk#FinancialLoss", + "@id": "https://w3id.org/dpv/risk#LoseOpportunity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -5482,7 +5828,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0296c48d481641d492572a05652b6bf5" + "@id": "_:N2ea871931e3746e4aff469f67008e44f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5498,13 +5844,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity" + "@value": "Something that acts as or causes Loss of Opportunity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5515,12 +5861,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Loss" + "@value": "Lose of Opportunity" } ] }, { - "@id": "_:N0296c48d481641d492572a05652b6bf5", + "@id": "_:N2ea871931e3746e4aff469f67008e44f", "@type": [ "https://schema.org/WebPage" ], @@ -5536,10 +5882,33 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#IndividualRisk", + "@id": "https://w3id.org/dpv/risk#UnauthorisedDataAccess", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N0eacc049940646a99623da2cd6a2d394" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -5552,10 +5921,18 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that affect or have the potential to affect specific individuals" + "@value": "Something that acts as or causes Unauthorised Data Access" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5566,12 +5943,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Individual Risk" + "@value": "Unauthorised Data Access" } ] }, { - "@id": "https://w3id.org/dpv/risk#Blackmail", + "@id": "_:N0eacc049940646a99623da2cd6a2d394", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#CompromiseAccountCredentials", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -5596,7 +5989,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N3ef9f5a9eb554279905f69c263712205" + "@id": "_:N1005943ded74408ea68c811475686000" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5612,13 +6005,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Blackmail" + "@value": "Something that acts as or causes Account Credentials to be compromised" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5629,28 +6025,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Blackmail" + "@value": "Compromise Account Credentials" } ] }, { - "@id": "_:N3ef9f5a9eb554279905f69c263712205", + "@id": "_:N1005943ded74408ea68c811475686000", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseNegotiatingCapacity", + "@id": "https://w3id.org/dpv/risk#UnwantedDisclosureData", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -5675,7 +6071,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd8a232e440f041b496b97da8007b588a" + "@id": "_:Nf14815c8a8694940bcdb35d12bf37b11" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5691,13 +6087,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Negotiating Capacity" + "@value": "Something that acts as or causes Unwanted Disclosure of Data" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5708,12 +6107,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Negotiating Capacity" + "@value": "Unwanted Disclosure of Data" } ] }, { - "@id": "_:Nd8a232e440f041b496b97da8007b588a", + "@id": "_:Nf14815c8a8694940bcdb35d12bf37b11", "@type": [ "https://schema.org/WebPage" ], @@ -5729,240 +6128,210 @@ ] }, { - "@id": "https://w3id.org/dpv/risk", + "@id": "https://w3id.org/dpv/risk#JudicialCosts", "@type": [ - "http://www.w3.org/2002/07/owl#Ontology", - "http://www.w3.org/ns/dx/prof/Profile" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/bibliographicCitation": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@value": "http://www.w3.org/2000/01/rdf-schema" - }, + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "http://www.w3.org/2004/02/skos/core" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - }, - { - "@value": "Georg P. Krog" - }, + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@value": "Beatriz Esteves" - }, + "@id": "https://w3id.org/dpv/risk#FinancialImpact" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@value": "Axel Polleres" - }, + "@language": "en", + "@value": "Something that involves or causes judicial costs to be paid" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@value": "Fajar Ekaputra" - }, + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "Delaram Golpayegani" - }, + "@language": "en", + "@value": "Judicial Costs" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#UserRisks", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Julian Flake" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "2022-08-14" + "@value": "accepted" } ], - "http://purl.org/dc/terms/creator": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@language": "en", - "@value": "Harshvardhan J. Pandit" - }, + "@id": "https://w3id.org/dpv#RiskConcept" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Georg P. Krog" - }, + "@value": "Concepts associated with risks that arise due to User or Human use" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@language": "en", - "@value": "Paul Ryan" - }, + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Rob Brennan" - }, - { - "@language": "en", - "@value": "Delaram Golpayegani" - }, - { - "@language": "en", - "@value": "Beatriz Esteves" - }, - { - "@language": "en", - "@value": "Julian Flake" - } - ], - "http://purl.org/dc/terms/description": [ - { - "@language": "en", - "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" - } - ], - "http://purl.org/dc/terms/identifier": [ - { - "@value": "https://w3id.org/dpv/risk" + "@value": "User Risks" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ViolatingContractualObligation", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/issued": [ + "http://purl.org/dc/terms/contributor": [ { - "@language": "en", - "@value": "2022-08-14" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/license": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.w3.org/copyright/document-license-2023/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "2024-07-13" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/publisher": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://www.w3.org/" + "@id": "_:N638499f1a35f4f94abab8a1e6e4bf97d" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.w3.org/groups/cg/dpvcg/" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "Risk Concepts" + "@value": "modified" } ], - "http://purl.org/ontology/bibo/doi": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@value": "10.5281/zenodo.12505841" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], - "http://purl.org/ontology/bibo/status": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@value": "http://purl.org/ontology/bibo/status/published" + "@language": "en", + "@value": "Something that acts as or causes Violation of Contractual Obligations" } ], - "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@value": "risk" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], - "http://purl.org/vocab/vann/preferredNamespaceUri": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "https://w3id.org/dpv/risk#" + "@language": "en", + "@value": "Violation of Contractual Obligation" } ], - "http://www.w3.org/2000/01/rdf-schema#Label": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "RISK" + "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0" } + ] + }, + { + "@id": "_:N638499f1a35f4f94abab8a1e6e4bf97d", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2002/07/owl#versionIRI": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/2.1-dev/risk" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2002/07/owl#versionInfo": [ + "https://schema.org/url": [ { - "@value": "2.1-dev" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-n3", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/ns/dx/prof/hasResource": [ - { - "@id": "https://w3id.org/dpv/primer" - }, - { - "@id": "https://w3id.org/dpv/guides" - }, - { - "@id": "https://w3id.org/dpv/examples" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-html" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-rdf" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-ttl" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-n3" - }, + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk#serialisation-jsonld" + "@id": "https://www.w3.org/TeamSubmission/n3/" } ], - "http://www.w3.org/ns/dx/prof/isProfileOf": [ - { - "@id": "http://www.w3.org/2000/01/rdf-schema#" - }, + "http://purl.org/dc/terms/format": [ { - "@id": "http://www.w3.org/2004/02/skos/core#" - }, + "@id": "https://www.iana.org/assignments/media-types/text/n3" + } + ], + "http://purl.org/dc/terms/title": [ { - "@id": "https://w3id.org/dpv" + "@value": "Risk Concepts - N3 serialiation" } ], - "http://xmlns.com/foaf/0.1/logo": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/media/logo.png" + "@id": "https://w3id.org/dpv/risk/risk.n3" } ], - "https://schema.org/version": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@value": "2.1-dev" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseOpportunity", + "@id": "https://w3id.org/dpv/risk#SecurityAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N0e6dade5a2814d0f815e1c5dd41f1c65" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -5976,13 +6345,22 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Opportunity" + "@value": "Something that acts as or causes an attack on security with the aim of undermining it" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5993,28 +6371,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Opportunity" - } - ] - }, - { - "@id": "_:N0e6dade5a2814d0f815e1c5dd41f1c65", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Security Attack" } ] }, { - "@id": "https://w3id.org/dpv/risk#ComponentFailure", + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -6033,13 +6395,22 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Component Failure" + "@value": "Something that acts as or causes Unauthorised Activity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6050,18 +6421,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Component Failure" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of" + "@value": "Unauthorised Activity" } ] }, { - "@id": "https://w3id.org/dpv/risk#BruteForceAuthorisations", + "@id": "https://w3id.org/dpv/risk#Fraud", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -6086,7 +6451,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ned6a23a4f6894305bc5d07abc6872b8e" + "@id": "_:N0328e4baf7504ceb93cd9bbab8b23099" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6101,6 +6466,9 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -6108,7 +6476,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques" + "@value": "Something that acts as or causes Fraud" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6119,28 +6487,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Brute Force Authorisations" + "@value": "Fraud" } ] }, { - "@id": "_:Ned6a23a4f6894305bc5d07abc6872b8e", + "@id": "_:N0328e4baf7504ceb93cd9bbab8b23099", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingLegalObligation", + "@id": "https://w3id.org/dpv/risk#MaliciousCodeAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -6165,7 +6533,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Naf3bb0ebde894641a8c0a69545e7f6cc" + "@id": "_:N625dc3c061c74eec9f96d171c60fd3c0" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6176,18 +6544,27 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Legal Obligations" + "@value": "Something that acts as or causes Malicious Code Attack" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6198,34 +6575,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Legal Obligations" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0" + "@value": "Malicious Code Attack" } ] }, { - "@id": "_:Naf3bb0ebde894641a8c0a69545e7f6cc", + "@id": "_:N625dc3c061c74eec9f96d171c60fd3c0", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#Scam", + "@id": "https://w3id.org/dpv/risk#CompromiseAccount", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -6250,7 +6621,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N498890541a5449e290f0aea406ea5090" + "@id": "_:N252928e4ed0f4c6ea83876f7fb2c3d78" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6266,13 +6637,22 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Scam" + "@value": "Something that acts as or causes a compromised account that is then used by the compromiser" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6283,86 +6663,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Scam" + "@value": "Compromise Account" } ] }, { - "@id": "_:N498890541a5449e290f0aea406ea5090", + "@id": "_:N252928e4ed0f4c6ea83876f7fb2c3d78", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#Discrimination", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Discrimination" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Discrimination" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnwantedDisclosureData", + "@id": "https://w3id.org/dpv/risk#BruteForceAuthorisations", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -6387,7 +6709,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N12b2c9394da44250a5ab771adc23fab8" + "@id": "_:Nb75b090fdcda4ec38e841680681bf642" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6402,6 +6724,12 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -6409,7 +6737,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Disclosure of Data" + "@value": "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6420,28 +6748,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Disclosure of Data" + "@value": "Brute Force Authorisations" } ] }, { - "@id": "_:N12b2c9394da44250a5ab771adc23fab8", + "@id": "_:Nb75b090fdcda4ec38e841680681bf642", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#PhishingScam", + "@id": "https://w3id.org/dpv/risk#ViolatingCodeOfConduct", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -6466,7 +6794,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N2039355de6a7474a8ab35355297e33c6" + "@id": "_:Nb240be91051241df8fe71581eedea8cc" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6477,18 +6805,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Phishing Scam" + "@value": "Something that acts as or causes Violation of Code of Conduct" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6499,50 +6827,39 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Phishing Scam" + "@value": "Violating Code of Conduct" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0" } ] }, { - "@id": "_:N2039355de6a7474a8ab35355297e33c6", + "@id": "_:Nb240be91051241df8fe71581eedea8cc", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#Renumeration", + "@id": "https://w3id.org/dpv/risk#IntentionalMisuse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -6556,13 +6873,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides renumeration which is in monetary or financial form" + "@value": "Intentional Misuse" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6573,12 +6890,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remuneration" + "@value": "Intentional Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk#EquipmentFailure", + "@id": "https://w3id.org/dpv/risk#PersonalSafetyEndangerment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -6603,7 +6920,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nc281053cb7ff4095b5eef42624c4ff46" + "@id": "_:Na783f8da28594e8794173492db9ecac9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6619,13 +6936,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Equipment Failure" + "@value": "Something that acts as or causes Personal Safety Endangerment" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6636,18 +6953,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Equipment Failure" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here equipment refers to physical equipment" + "@value": "Personal Safety Endangerment" } ] }, { - "@id": "_:Nc281053cb7ff4095b5eef42624c4ff46", + "@id": "_:Na783f8da28594e8794173492db9ecac9", "@type": [ "https://schema.org/WebPage" ], @@ -6663,7 +6974,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#LoseTrust", + "@id": "https://w3id.org/dpv/risk#IdentityTheft", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -6688,7 +6999,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nbb93cef662444084828d04948d35895d" + "@id": "_:N33b7660d50a4461e927089957dfd848b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6704,13 +7015,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Trust" + "@value": "Something that acts as or causes Identity Theft" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6721,531 +7035,234 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Trust" + "@value": "Identity Theft" } ] }, { - "@id": "_:Nbb93cef662444084828d04948d35895d", + "@id": "_:N33b7660d50a4461e927089957dfd848b", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk#AccidentalMisuse", + "@id": "https://w3id.org/dpv/risk", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "http://www.w3.org/2002/07/owl#Ontology", + "http://www.w3.org/ns/dx/prof/Profile" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/bibliographicCitation": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@language": "en", - "@value": "accepted" + "@value": "http://www.w3.org/2000/01/rdf-schema" + }, + { + "@value": "http://www.w3.org/2004/02/skos/core" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk#UserRisks" + "@value": "Delaram Golpayegani" + }, + { + "@value": "Fajar Ekaputra" + }, + { + "@value": "Axel Polleres" + }, + { + "@value": "Beatriz Esteves" + }, + { + "@value": "Georg P. Krog" + }, + { + "@value": "Julian Flake" + }, + { + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/created": [ { "@language": "en", - "@value": "Accidental Misuse" + "@value": "2022-08-14" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/dc/terms/creator": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@language": "en", + "@value": "Harshvardhan J. Pandit" + }, + { + "@language": "en", + "@value": "Georg P. Krog" + }, + { + "@language": "en", + "@value": "Paul Ryan" + }, + { + "@language": "en", + "@value": "Rob Brennan" + }, + { + "@language": "en", + "@value": "Delaram Golpayegani" + }, + { + "@language": "en", + "@value": "Beatriz Esteves" + }, + { + "@language": "en", + "@value": "Julian Flake" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/description": [ { "@language": "en", - "@value": "Accidental Misuse" + "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IdentityTheft", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/identifier": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "https://w3id.org/dpv/risk" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/issued": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@language": "en", + "@value": "2022-08-14" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nad476399871e41a5bd37e1133df27770" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Identity Theft" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Identity Theft" - } - ] - }, - { - "@id": "_:Nad476399871e41a5bd37e1133df27770", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#Sabotage", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nddcd9454cd3f48779b8299743d6f1150" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Sabotage" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Sabotage" - } - ] - }, - { - "@id": "_:Nddcd9454cd3f48779b8299743d6f1150", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#UnauthorisedReidentification", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog" - } - ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/license": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@id": "https://www.w3.org/copyright/document-license-2023/" } ], "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Unauthorised Re-Identification" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Re-Identification" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#InterceptCommunications", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-07-13" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/publisher": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@id": "https://www.w3.org/" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N9ba04625c759479eba79e0016163e8e6" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "modified" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Interception of Communications" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Intercept Communications" + "@id": "https://www.w3.org/groups/cg/dpvcg/" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "http://purl.org/dc/terms/title": [ { "@language": "en", - "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N9ba04625c759479eba79e0016163e8e6", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#SocietalRisk", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" + "@value": "Risk Concepts" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/ontology/bibo/doi": [ { - "@language": "en", - "@value": "accepted" + "@value": "10.5281/zenodo.12505841" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/ontology/bibo/status": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@value": "http://purl.org/ontology/bibo/status/published" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/vocab/vann/preferredNamespacePrefix": [ { - "@language": "en", - "@value": "Risks and issues that affect or have the potential to affect society at large or specific groups in society" + "@value": "risk" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/vocab/vann/preferredNamespaceUri": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@value": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/2000/01/rdf-schema#Label": [ { "@language": "en", - "@value": "Societal Risk" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#MaliciousCodeAttack", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N7beef942706b41468112e467b91c5f39" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" + "@value": "RISK" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/2002/07/owl#versionIRI": [ { - "@language": "en", - "@value": "accepted" + "@id": "https://w3id.org/dpv/2.1-dev/risk" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://www.w3.org/2002/07/owl#versionInfo": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@value": "2.1-dev" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/ns/dx/prof/hasResource": [ { - "@language": "en", - "@value": "Something that acts as or causes Malicious Code Attack" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "@id": "https://w3id.org/dpv/primer" + }, { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "@id": "https://w3id.org/dpv/guides" + }, { - "@language": "en", - "@value": "Malicious Code Attack" - } - ] - }, - { - "@id": "_:N7beef942706b41468112e467b91c5f39", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ + "@id": "https://w3id.org/dpv/examples" + }, { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ + "@id": "https://w3id.org/dpv/risk#serialisation-html" + }, { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ViolatingPolicy", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "@id": "https://w3id.org/dpv/risk#serialisation-rdf" + }, { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "@id": "https://w3id.org/dpv/risk#serialisation-ttl" + }, { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "@id": "https://w3id.org/dpv/risk#serialisation-n3" + }, { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#serialisation-jsonld" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/ns/dx/prof/isProfileOf": [ { - "@language": "en", - "@value": "Something that acts as or causes violation of policy which can be either internal or external policy" + "@id": "http://www.w3.org/2000/01/rdf-schema#" + }, + { + "@id": "http://www.w3.org/2004/02/skos/core#" + }, + { + "@id": "https://w3id.org/dpv" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://xmlns.com/foaf/0.1/logo": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/media/logo.png" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/version": [ { - "@language": "en", - "@value": "Violating Policy" + "@value": "2.1-dev" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseCredibility", + "@id": "https://w3id.org/dpv/risk#PsychologicalHarm", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -7270,7 +7287,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N347037135ba54cefae0a2a69a47e52d9" + "@id": "_:N0ddf524630684b719d7f03f907c20cff" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7286,13 +7303,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Credibility" + "@value": "Something that acts as or causes Psychological Harm" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7303,63 +7320,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Credibility" + "@value": "Psychological Harm" } ] }, { - "@id": "_:N347037135ba54cefae0a2a69a47e52d9", + "@id": "_:N0ddf524630684b719d7f03f907c20cff", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#PhysicalHarm", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Physical Harm" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#Terrorism", + "@id": "https://w3id.org/dpv/risk#Benefit", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -7367,13 +7349,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-23" } ], "http://purl.org/dc/terms/modified": [ @@ -7382,11 +7364,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nf6a25073f9274363bcb649fe8540fc70" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -7400,13 +7377,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Terrorism" + "@value": "Something that acts as or causes benefits" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7417,32 +7394,33 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Terrorism" + "@value": "Benefit" } ] }, { - "@id": "_:Nf6a25073f9274363bcb649fe8540fc70", + "@id": "https://w3id.org/dpv/risk#Detriment", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-03-23" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IntentionalMisuse", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -7457,13 +7435,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UserRisks" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Intentional Misuse" + "@value": "Something that acts as or causes Detriment" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7474,12 +7452,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Intentional Misuse" + "@value": "Detriment" } ] }, { - "@id": "https://w3id.org/dpv/risk#Benefit", + "@id": "https://w3id.org/dpv/risk#Payment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -7487,13 +7465,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" + "@value": "2024-04-14" } ], "http://purl.org/dc/terms/modified": [ @@ -7521,7 +7499,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes benefits" + "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7532,12 +7510,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Benefit" + "@value": "Payment" } ] }, { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk", + "@id": "https://w3id.org/dpv/risk#SocietalHealthSafety", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -7556,13 +7534,7 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Risks and issues that arise during operational processes" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7573,17 +7545,34 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Operational Security Risk" + "@value": "Societal Health & Safety" } ] }, { - "@id": "https://w3id.org/dpv/risk#ComponentMalfunction", + "@id": "https://w3id.org/dpv/risk#RightsLimitation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -7597,13 +7586,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Component Malfunction" + "@value": "Something that acts as or causes Limitation of Rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7614,18 +7603,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Component Malfunction" + "@value": "Limitation of Rights" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of" + "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk#Payment", + "@id": "https://w3id.org/dpv/risk#Blackmail", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -7633,13 +7622,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -7648,6 +7637,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N72e00e4999f548eb88bf909311860524" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -7661,13 +7655,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources" + "@value": "Something that acts as or causes Blackmail" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7678,12 +7675,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Payment" + "@value": "Blackmail" } ] }, { - "@id": "https://w3id.org/dpv/risk#Fee", + "@id": "_:N72e00e4999f548eb88bf909311860524", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#PhysicalAssault", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -7691,13 +7704,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -7708,8 +7721,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "DGA 2.10" + "@id": "_:N6b8cf1ee50ba4ea081a101b53baf3bb3" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7720,18 +7732,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides fees e.g. for using a service" + "@value": "Something that acts as or causes Physical Assault" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7742,58 +7754,81 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Fee" + "@value": "Physical Assault" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat", + "@id": "_:N6b8cf1ee50ba4ea081a101b53baf3bb3", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://schema.org/WebPage" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "accepted" + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-ttl", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/turtle/" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://www.iana.org/assignments/media-types/text/turtle" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "Concepts associated with security threats that are likely to originate externally" + "@value": "Risk Concepts - Turtle serialiation" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk/risk.ttl" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "External Security Threat" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk#FinancialImpact", + "@id": "https://w3id.org/dpv/risk#MaterialDamage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-03-30" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -7807,13 +7842,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Things that cause or have the potential to impact financial resources" + "@value": "Something that acts as or causes Material Damage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7824,12 +7859,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Impact" + "@value": "Material Damage" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" } ] }, { - "@id": "https://w3id.org/dpv/risk#CopyrightViolation", + "@id": "https://w3id.org/dpv/risk#EquipmentFailure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -7854,7 +7895,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N73922ea12cd34584b91e209f306167ae" + "@id": "_:N8e86fbf714a04b25a51dfcacec1cb10e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7870,13 +7911,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Copyright Violation" + "@value": "Something that acts as or causes Equipment Failure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7887,28 +7931,34 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Copyright Violation" + "@value": "Equipment Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here equipment refers to physical equipment" } ] }, { - "@id": "_:N73922ea12cd34584b91e209f306167ae", + "@id": "_:N8e86fbf714a04b25a51dfcacec1cb10e", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#CompromiseAccount", + "@id": "https://w3id.org/dpv/risk#Scam", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -7933,7 +7983,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N2ad682e6dc844471903bc2f55f3eaae7" + "@id": "_:Nea270aca30b44f5a8cfda049ee8bf631" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7949,13 +7999,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes a compromised account that is then used by the compromiser" + "@value": "Something that acts as or causes Scam" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7966,54 +8019,62 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account" + "@value": "Scam" } ] }, { - "@id": "_:N2ad682e6dc844471903bc2f55f3eaae7", + "@id": "_:Nea270aca30b44f5a8cfda049ee8bf631", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#ErroneousSystemUse", + "@id": "https://w3id.org/dpv/risk#serialisation-html", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://www.w3.org/TR/html/" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/format": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/title": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "Risk Concepts - HTML serialiation" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.html" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "_:Ne874eff2b0f74da79392c36cf77d71f1" + "@id": "http://www.w3.org/ns/dx/prof/role/specification" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IndividualRisk", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -8026,15 +8087,10 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#UserRisks" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Erroneous System Use" + "@value": "Risks and issues that affect or have the potential to affect specific individuals" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8045,28 +8101,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Erroneous System Use" - } - ] - }, - { - "@id": "_:Ne874eff2b0f74da79392c36cf77d71f1", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Individual Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#VulnerabilityCreated", + "@id": "https://w3id.org/dpv/risk#RightsViolation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -8074,13 +8114,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://purl.org/dc/terms/modified": [ @@ -8089,11 +8129,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nc0018c079b6b42619d869b3ae63ec70a" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -8107,13 +8142,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#InternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Vulnerability Created" + "@value": "Something that acts as or causes Violation of Rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8124,28 +8159,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Vulnerability Created" - } - ] - }, - { - "@id": "_:Nc0018c079b6b42619d869b3ae63ec70a", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Violation of Rights" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk#IdentityFraud", + "@id": "https://w3id.org/dpv/risk#DataBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -8170,7 +8195,15 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nbc1a7f7ae94c4fde84913e9622b759f6" + "@id": "_:N0353966748ad43cc9b9c03081ec6b6f9" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples#E0069" + }, + { + "@id": "https://w3id.org/dpv/examples#E0071" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8186,13 +8219,22 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#SecurityBreach" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Identity Fraud" + "@value": "Something that acts as or causes Data Breach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8203,28 +8245,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identity Fraud" + "@value": "Data Breach" } ] }, { - "@id": "_:Nbc1a7f7ae94c4fde84913e9622b759f6", + "@id": "_:N0353966748ad43cc9b9c03081ec6b6f9", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedDataModification", + "@id": "https://w3id.org/dpv/risk#MalwareAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -8249,7 +8291,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Naa83e8f3fb5e4e9a88398292112d68f3" + "@id": "_:N6fb9cc1510c4401a9c582949b7a8c8b7" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8264,6 +8306,15 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -8271,7 +8322,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Modification" + "@value": "Something that acts as or causes Malware Attack" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8282,33 +8333,55 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Modification" + "@value": "Malware Attack" } ] }, { - "@id": "_:Naa83e8f3fb5e4e9a88398292112d68f3", + "@id": "_:N6fb9cc1510c4401a9c582949b7a8c8b7", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity", + "@id": "https://w3id.org/dpv/risk#DenialServiceAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N8705162a41ca472c9e3867ec5902de25" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -8321,6 +8394,9 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -8328,7 +8404,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Activity" + "@value": "Something that acts as or causes Denial of Service Attack (DoS)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8339,7 +8415,23 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Activity" + "@value": "Denial of Service Attack (DoS)" + } + ] + }, + { + "@id": "_:N8705162a41ca472c9e3867ec5902de25", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" } ] } diff --git a/2.1-dev/risk/modules/risk_consequences.n3 b/2.1-dev/risk/modules/risk_consequences.n3 index b23e5df5b..87558834f 100644 --- a/2.1-dev/risk/modules/risk_consequences.n3 +++ b/2.1-dev/risk/modules/risk_consequences.n3 @@ -36,7 +36,9 @@ risk:AuthorisationFailure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Authorisation Failure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Authorisation Failure"@en . @@ -46,7 +48,8 @@ risk:AvailabilityBreach a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:DataBreach ; + skos:broader risk:AvailabilityConcept, + risk:DataBreach ; skos:inScheme risk:risk-consequences-classes . risk:Benefit a rdfs:Class, @@ -73,7 +76,8 @@ risk:Blackmail a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Blackmail"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Blackmail"@en . @@ -89,7 +93,9 @@ risk:BruteForceAuthorisations a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Brute Force Authorisations"@en . @@ -105,7 +111,8 @@ risk:Coercion a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Coercion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Coercion"@en . @@ -128,7 +135,8 @@ risk:ComponentFailure a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Component Failure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Component Failure"@en ; @@ -139,7 +147,8 @@ risk:ComponentMalfunction a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Component Malfunction"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Component Malfunction"@en ; @@ -156,7 +165,10 @@ risk:CompromiseAccount a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Compromise Account"@en . @@ -172,7 +184,8 @@ risk:CompromiseAccountCredentials a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:ConfidentialityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Compromise Account Credentials"@en . @@ -188,7 +201,8 @@ risk:ConfidentialityBreach a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:DataBreach ; + skos:broader risk:ConfidentialityConcept, + risk:DataBreach ; skos:definition "Something that acts as or causes Confidentiality Breach"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Confidentiality Breach"@en . @@ -220,7 +234,8 @@ risk:Cryptojacking a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Cryptojacking"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Cryptojacking"@en . @@ -251,7 +266,10 @@ risk:DataBreach a rdfs:Class, dex:E0071 ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SecurityBreach ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:SecurityBreach ; skos:definition "Something that acts as or causes Data Breach"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Data Breach"@en . @@ -267,7 +285,8 @@ risk:DataCorruption a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:IntegrityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Corruption of Data"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Data Corruption"@en ; @@ -280,14 +299,12 @@ risk:DenialServiceAttack a rdfs:Class, dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ], - [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Denial of Service Attack (DoS)"@en . @@ -329,7 +346,8 @@ risk:DistributedDenialServiceAttack a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en . @@ -355,7 +373,8 @@ risk:EquipmentFailure a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Equipment Failure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Equipment Failure"@en ; @@ -372,7 +391,8 @@ risk:EquipmentMalfunction a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Equipment Malfunction"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Equipment Malfunction"@en ; @@ -432,7 +452,8 @@ risk:Extorsion a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Extorsion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Extorsion"@en . @@ -488,7 +509,8 @@ risk:Fraud a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Fraud"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Fraud"@en . @@ -534,7 +556,8 @@ risk:IdentityFraud a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:ConfidentialityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Identity Fraud"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Identity Fraud"@en . @@ -550,7 +573,8 @@ risk:IdentityTheft a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:ConfidentialityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Identity Theft"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Identity Theft"@en . @@ -610,7 +634,8 @@ risk:IntegrityBreach a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:DataBreach ; + skos:broader risk:DataBreach, + risk:IntegrityConcept ; skos:inScheme risk:risk-consequences-classes . risk:IntentionalMisuse a rdfs:Class, @@ -634,22 +659,13 @@ risk:InterceptCommunications a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Interception of Communications"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Intercept Communications"@en ; skos:scopeNote "This concept was called \"InterceptionCommunications\" in DPV 2.0"@en . -risk:InternalSecurityThreat a rdfs:Class, - skos:Concept, - dpv:RiskConcept ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader dpv:RiskConcept ; - skos:definition "Concepts associated with security threats and issues that originate within the organisation"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Internal Security Threat"@en . - risk:JudicialCosts a rdfs:Class, skos:Concept, dpv:RiskConcept ; @@ -803,7 +819,10 @@ risk:MaliciousCodeAttack a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Malicious Code Attack"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Malicious Code Attack"@en . @@ -819,7 +838,10 @@ risk:MalwareAttack a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Malware Attack"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Malware Attack"@en . @@ -915,7 +937,8 @@ risk:PhishingScam a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Phishing Scam"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Phishing Scam"@en . @@ -994,7 +1017,8 @@ risk:Reidentification a rdfs:Class, dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:ConfidentialityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Re-identification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Re-identification"@en ; @@ -1107,7 +1131,9 @@ risk:Sabotage a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Sabotage"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Sabotage"@en . @@ -1123,7 +1149,8 @@ risk:Scam a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Scam"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Scam"@en . @@ -1133,7 +1160,10 @@ risk:SecurityAttack a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Security Attack"@en . @@ -1149,7 +1179,10 @@ risk:SecurityBreach a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Security Breach"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Security Breach"@en . @@ -1216,7 +1249,9 @@ risk:Spoofing a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat, + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept, risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Spoofing"@en ; skos:inScheme risk:risk-consequences-classes ; @@ -1233,7 +1268,8 @@ risk:SystemFailure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes System Failure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "System Failure"@en ; @@ -1250,7 +1286,10 @@ risk:SystemIntrusion a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes System Intrusion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "System Intrusion"@en . @@ -1266,7 +1305,8 @@ risk:SystemMalfunction a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes System Malfunction"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "System Malfunction"@en ; @@ -1299,7 +1339,10 @@ risk:UnauthorisedAccesstoPremises a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Access to Premises"@en . @@ -1309,7 +1352,10 @@ risk:UnauthorisedActivity a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised Activity"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Activity"@en . @@ -1325,7 +1371,9 @@ risk:UnauthorisedCodeAccess a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised Code Access"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Code Access"@en . @@ -1341,7 +1389,8 @@ risk:UnauthorisedCodeDisclosure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Code Disclosure"@en . @@ -1357,7 +1406,8 @@ risk:UnauthorisedCodeModification a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Code Modification"@en . @@ -1373,7 +1423,8 @@ risk:UnauthorisedDataAccess a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Data Access"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Data Access"@en . @@ -1389,7 +1440,8 @@ risk:UnauthorisedDataDisclosure a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Data Disclosure"@en . @@ -1405,7 +1457,8 @@ risk:UnauthorisedDataModification a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Data Modification"@en . @@ -1421,7 +1474,8 @@ risk:UnauthorisedInformationDisclosure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Information Disclosure"@en . @@ -1434,7 +1488,8 @@ risk:UnauthorisedReidentification a rdfs:Class, dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Re-Identification"@en . @@ -1450,7 +1505,8 @@ risk:UnauthorisedResourceUse a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Resource Use"@en . @@ -1466,7 +1522,9 @@ risk:UnauthorisedSystemAccess a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised System Access"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised System Access"@en . @@ -1482,7 +1540,8 @@ risk:UnauthorisedSystemModification a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised System Modification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised System Modification"@en . @@ -1498,7 +1557,9 @@ risk:UnwantedCodeDeletion a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unwanted Code Deletion"@en . @@ -1514,7 +1575,9 @@ risk:UnwantedDataDeletion a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unwanted Data Deletion"@en . @@ -1530,7 +1593,8 @@ risk:UnwantedDisclosureData a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unwanted Disclosure of Data"@en . @@ -1657,22 +1721,6 @@ risk:ViolenceAgainstChildren a rdfs:Class, skos:prefLabel "Violence against children"@en ; skos:scopeNote "This concept was called \"ChildViolence\" in DPV 2.0"@en . -risk:VulnerabilityCreated a rdfs:Class, - skos:Concept, - dpv:RiskConcept ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:modified "2024-08-16"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:InternalSecurityThreat ; - skos:definition "Something that acts as or causes Vulnerability Created"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Vulnerability Created"@en . - a owl:Ontology, profile:Profile ; dct:bibliographicCitation "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" ; diff --git a/2.1-dev/risk/modules/risk_consequences.rdf b/2.1-dev/risk/modules/risk_consequences.rdf index 4b756e8b0..0e164a9c5 100644 --- a/2.1-dev/risk/modules/risk_consequences.rdf +++ b/2.1-dev/risk/modules/risk_consequences.rdf @@ -12,14 +12,26 @@ xmlns:sw="http://www.w3.org/2003/06/sw-vocab-status/ns#" xmlns:vann="http://purl.org/vocab/vann/" > - + - Physical Assault - Something that acts as or causes Physical Assault - - + Judicial Costs + Something that involves or causes judicial costs to be paid + + accepted + + + + + + + + Blackmail + Something that acts as or causes Blackmail + + + 2022-08-17 2024-08-16 accepted @@ -27,73 +39,80 @@ - + - Lose of Negotiating Capacity - Something that acts as or causes Loss of Negotiating Capacity - - + Violation of Contractual Obligation + Something that acts as or causes Violation of Contractual Obligations + + This concept was called "ViolationContractualObligations" in DPV 2.0 + 2022-08-17 2024-08-16 - accepted + modified Harshvardhan J. Pandit - + - Remuneration - Something that acts as or provides renumeration which is in monetary or financial form + Fee + Something that acts as or provides fees e.g. for using a service + DGA 2.10 2024-04-14 2024-08-16 - accepted + modified Georg P. Krog, Harshvardhan J. Pandit - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - + - Social Disadvantage - Something that acts as or causes Social Disadvantage - - 2022-08-19 - 2024-08-16 + Component Malfunction + Something that acts as or causes Component Malfunction + + + Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of accepted - Georg P. Krog - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - Societal Risk - Risks and issues that affect or have the potential to affect society at large or specific groups in society - + Identity Fraud + Something that acts as or causes Identity Fraud + + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - Lose of Reputation - Something that acts as or causes Loss of Reputation - - + Cryptojacking + Something that acts as or causes Cryptojacking + + + 2022-08-17 2024-08-16 accepted @@ -101,14 +120,15 @@ - + - Phishing Scam - Something that acts as or causes Phishing Scam + Distributed Denial of Service Attack (DDoS) + Something that acts as or causes Distributed Denial of Service Attack (DDoS) + - + 2022-08-17 2024-08-16 accepted @@ -116,24 +136,33 @@ - + - Physical Harm - + Re-identification + Something that acts as or causes Re-identification + + + Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification + 2022-08-19 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - Compromise Account Credentials - Something that acts as or causes Account Credentials to be compromised - - + Unauthorised Access to Premises + Something that acts as or causes Unauthorised Access to Premises + + + + + 2022-08-17 2024-08-16 accepted @@ -141,38 +170,32 @@ - + - System Failure - Something that acts as or causes System Failure + Data Corruption + Something that acts as or causes Corruption of Data + - Here system refers to both hardware and software systems - + This concept was called "Corruption Data" in DPV 2.0 + 2022-08-17 2024-08-16 - accepted + modified Harshvardhan J. Pandit - - - - - - - Risk Concepts - HTML serialiation - - + - Unwanted Data Deletion - Something that acts as or causes Unwanted Data Deletion + Unauthorised Data Access + Something that acts as or causes Unauthorised Data Access + - + 2022-08-17 2024-08-16 accepted @@ -180,14 +203,16 @@ - + - Sabotage - Something that acts as or causes Sabotage - - + Equipment Malfunction + Something that acts as or causes Equipment Malfunction + + + Here equipment refers to physical equipment + 2022-08-17 2024-08-16 accepted @@ -195,65 +220,65 @@ - + - Sexual Violence - Something that acts as or causes Sexual Violence - - - 2022-08-17 - 2024-08-16 + Financial Impact + Things that cause or have the potential to impact financial resources + accepted - Harshvardhan J. Pandit - + - Violence against children - Something that acts as or causes Child Violence - - This concept was called "ChildViolence" in DPV 2.0 - - 2022-08-17 + Damage + Something that acts as or causes Damage + + 2022-03-30 2024-08-16 accepted Harshvardhan J. Pandit - + - Personal Safety Endangerment - Something that acts as or causes Personal Safety Endangerment + Discrimination + Something that acts as or causes Discrimination - - 2022-08-17 + 2022-08-19 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + + Operational Security Risk + Risks and issues that arise during operational processes + + accepted + + - + - Fraud - Something that acts as or causes Fraud + Unauthorised Code Modification + Something that acts as or causes Unauthorised Code Modification + - + 2022-08-17 2024-08-16 accepted @@ -261,86 +286,80 @@ - + - Data Breach - Something that acts as or causes Data Breach - - + Violation of Legal Obligations + Something that acts as or causes Violation of Legal Obligations + + This concept was called "ViolationRegulatoryObligations" in DPV 2.0 + 2022-08-17 2024-08-16 - accepted + modified Harshvardhan J. Pandit - - - + ENISA Reference Incident Classification Taxonomy 2018 https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - Material Damage - Something that acts as or causes Material Damage - - The criteria for what is considered material damage is based in jurisdictional laws and norms - 2022-03-30 + Exposure to Harmful Speech + Something that acts as or causes Harmful Speech + + This concept was called "HarmfulSpeech" in DPV 2.0 + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - Unauthorised Activity - Something that acts as or causes Unauthorised Activity - + System Failure + Something that acts as or causes System Failure + + + Here system refers to both hardware and software systems + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - Detriment - Something that acts as or causes Detriment - - 2022-03-23 - 2024-08-16 + Privacy + accepted - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves - - - ENISA Threat Landscape for Ransomware Attacks 2022 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - - + - Copyright Violation - Something that acts as or causes Copyright Violation - - + Brute Force Authorisations + Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques + + + + 2022-08-17 2024-08-16 accepted @@ -348,71 +367,66 @@ - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - + - Societal Health & Safety - + Sabotage + Something that acts as or causes Sabotage + + + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - Violation of Statutory Obligations - Something that acts as or causes Violation of Statutory Obligations - - This concept was called "ViolationStatutoryObligations" in DPV 2.0 - + Unauthorised Code Disclosure + Something that acts as or causes Unauthorised Code Disclosure + + + 2022-08-17 2024-08-16 - modified + accepted Harshvardhan J. Pandit - + - Violation of Contractual Obligation - Something that acts as or causes Violation of Contractual Obligations - - This concept was called "ViolationContractualObligations" in DPV 2.0 - + Violence against children + Something that acts as or causes Child Violence + + This concept was called "ChildViolence" in DPV 2.0 + 2022-08-17 2024-08-16 - modified + accepted Harshvardhan J. Pandit - + - Cryptojacking - Something that acts as or causes Cryptojacking + System Intrusion + Something that acts as or causes System Intrusion + + + - + 2022-08-17 2024-08-16 accepted @@ -420,14 +434,20 @@ - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - Lose of Goodwill - Something that acts as or causes Loss of Goodwill - - + Unwanted Disclosure of Data + Something that acts as or causes Unwanted Disclosure of Data + + + 2022-08-17 2024-08-16 accepted @@ -435,114 +455,180 @@ - + - Violating Policy - Something that acts as or causes violation of policy which can be either internal or external policy - + Misuse + Something that acts as or causes Misuse + + 2024-06-11 + 2024-08-16 accepted + Delaram Golpayegani - + + + + + + Risk Concepts + http://purl.org/ontology/bibo/status/published + RISK + Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management + 2022-08-14 + 2022-08-14 + 2024-07-13 + Harshvardhan J. Pandit + Georg P. Krog + Paul Ryan + Rob Brennan + Delaram Golpayegani + Beatriz Esteves + Julian Flake + 2.1-dev + 2.1-dev + https://w3id.org/dpv/risk + http://www.w3.org/2000/01/rdf-schema + http://www.w3.org/2004/02/skos/core + 10.5281/zenodo.12505841 + Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 + + + Delaram Golpayegani + Fajar Ekaputra + Axel Polleres + Beatriz Esteves + Georg P. Krog + Julian Flake + Harshvardhan J. Pandit + + risk + https://w3id.org/dpv/risk# + + + + + + + + + + + + + - External Security Threat - Concepts associated with security threats that are likely to originate externally - + Benefit + Something that acts as or causes benefits + + 2022-03-23 + 2024-08-16 accepted + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres - + - Lose of Opportunity - Something that acts as or causes Loss of Opportunity - - + Intercept Communications + Something that acts as or causes Interception of Communications + + + This concept was called "InterceptionCommunications" in DPV 2.0 + 2022-08-17 2024-08-16 - accepted + modified Harshvardhan J. Pandit - + - Component Malfunction - Something that acts as or causes Component Malfunction - - Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of + Lose of Opportunity + Something that acts as or causes Loss of Opportunity + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - Identity Fraud - Something that acts as or causes Identity Fraud - - - 2022-08-17 - 2024-08-16 + + accepted - Harshvardhan J. Pandit - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - Unwanted Disclosure of Data - Something that acts as or causes Unwanted Disclosure of Data - - - 2022-08-17 + Harm + Something that acts as or causes Harm to humans + + This concept refers to the general abstract notion of harm + 2022-08-13 2024-08-16 accepted Harshvardhan J. Pandit - + - Payment - Something that acts as or provides payment e.g. to access a service or purchase resources - - 2024-04-14 + Data Breach + Something that acts as or causes Data Breach + + + + + + 2022-08-17 2024-08-16 accepted - Georg P. Krog, Harshvardhan J. Pandit + Harshvardhan J. Pandit + + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - Impact to Rights - Something that acts as or causes Impact to Rights - - - This concept was called "ImpactToRights" in DPV 2.0 - + Extorsion + Something that acts as or causes Extorsion + + + 2022-08-17 2024-08-16 accepted @@ -550,65 +636,56 @@ - + - Violation of Legal Obligations - Something that acts as or causes Violation of Legal Obligations - - This concept was called "ViolationRegulatoryObligations" in DPV 2.0 - + Financial Loss + Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity + + 2022-08-17 2024-08-16 - modified + accepted Harshvardhan J. Pandit - - - - - - - Risk Concepts - Turtle serialiation - - + - Unauthorised Code Access - Something that acts as or causes Unauthorised Code Access - - - 2022-08-17 - 2024-08-16 + Intentional Misuse + Intentional Misuse + accepted - Harshvardhan J. Pandit - + - Reputational Risk - Risks and issues that affect the reputation of the organisation - + Lose of Trust + Something that acts as or causes Loss of Trust + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - Violating Code of Conduct - Something that acts as or causes Violation of Code of Conduct + Violating Ethics Code + Something that acts as or causes Violation of Ethics Code - This concept was called "ViolationCodeConduct" in DPV 2.0 - + This concept was called "ViolationEthicalCode" in DPV 2.0 + 2022-08-17 2024-08-16 modified @@ -616,96 +693,85 @@ - + - Human Errors - Something that acts as or causes Human Errors - - - 2022-08-17 - 2024-08-16 - accepted - Harshvardhan J. Pandit - - - - - - - - Re-identification - Something that acts as or causes Re-identification - - Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification - 2022-08-19 + Unauthorised Data Disclosure + Something that acts as or causes Unauthorised Data Disclosure + + + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISa Trust Services Security Incidents 2021 + https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 - + - Intercept Communications - Something that acts as or causes Interception of Communications - - This concept was called "InterceptionCommunications" in DPV 2.0 - + Compromise Account Credentials + Something that acts as or causes Account Credentials to be compromised + + + 2022-08-17 2024-08-16 - modified + accepted Harshvardhan J. Pandit - + - Public Order Breach - Something that acts as or causes Public Order Breach + Detriment + Something that acts as or causes Detriment - - 2022-08-17 + 2022-03-23 2024-08-16 accepted - Harshvardhan J. Pandit + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves - + - Financial Impact - Things that cause or have the potential to impact financial resources - + Psychological Harm + Something that acts as or causes Psychological Harm + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + - Malicious Code Attack - Something that acts as or causes Malicious Code Attack - - + Personal Safety Endangerment + Something that acts as or causes Personal Safety Endangerment + + 2022-08-17 2024-08-16 accepted @@ -713,14 +779,14 @@ - + - Security Breach - Something that acts as or causes Security Breach - - + Injury + Something that acts as or causes Injury + + 2022-08-17 2024-08-16 accepted @@ -728,14 +794,14 @@ - + - Confidentiality Breach - Something that acts as or causes Confidentiality Breach - - + Copyright Violation + Something that acts as or causes Copyright Violation + + 2022-08-17 2024-08-16 accepted @@ -743,19 +809,20 @@ - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - Identity Theft - Something that acts as or causes Identity Theft - - + Unauthorised Data Modification + Something that acts as or causes Unauthorised Data Modification + + + 2022-08-17 2024-08-16 accepted @@ -763,44 +830,46 @@ - + - Damage - Something that acts as or causes Damage - - 2022-03-30 + Lose of Reputation + Something that acts as or causes Loss of Reputation + + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + - Limitation of Rights - Something that acts as or causes Limitation of Rights - - This concept was called "LimitationOfRights" in DPV 2.0 - 2022-08-18 + Confidentiality Breach + Something that acts as or causes Confidentiality Breach + + + + 2022-08-17 2024-08-16 accepted - Georg P. Krog, Harshvardhan J. Pandit + Harshvardhan J. Pandit - + - Equipment Failure - Something that acts as or causes Equipment Failure - - Here equipment refers to physical equipment - + Fraud + Something that acts as or causes Fraud + + + 2022-08-17 2024-08-16 accepted @@ -808,19 +877,26 @@ - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - Unauthorised Data Disclosure - Something that acts as or causes Unauthorised Data Disclosure + Unwanted Data Deletion + Something that acts as or causes Unwanted Data Deletion + + - + 2022-08-17 2024-08-16 accepted @@ -843,28 +919,33 @@ - + - Unauthorised Re-Identification - Something that acts as or causes Unauthorised Re-Identification - - 2022-08-19 + Compromise Account + Something that acts as or causes a compromised account that is then used by the compromiser + + + + + + 2022-08-17 2024-08-16 accepted - Georg P. Krog + Harshvardhan J. Pandit - + - Financial Loss - Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity - - + Denial of Service Attack (DoS) + Something that acts as or causes Denial of Service Attack (DoS) + + + 2022-08-17 2024-08-16 accepted @@ -872,14 +953,14 @@ - + - Erroneous System Use - Something that acts as or causes Erroneous System Use - - + Public Order Breach + Something that acts as or causes Public Order Breach + + 2022-08-17 2024-08-16 accepted @@ -887,30 +968,22 @@ - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - + - Exposure to Harmful Speech - Something that acts as or causes Harmful Speech - - This concept was called "HarmfulSpeech" in DPV 2.0 - + Malicious Code Attack + Something that acts as or causes Malicious Code Attack + + + + + 2022-08-17 2024-08-16 accepted @@ -918,164 +991,57 @@ - - - - - Judicial Costs - Something that involves or causes judicial costs to be paid - - accepted - - - - + - Coercion - Something that acts as or causes Coercion - - - 2022-08-17 - 2024-08-16 + Reputational Risk + Risks and issues that affect the reputation of the organisation + accepted - Harshvardhan J. Pandit - - - - - - Risk Concepts - http://purl.org/ontology/bibo/status/published - RISK - Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management - 2022-08-14 - 2022-08-14 - 2024-07-13 - Harshvardhan J. Pandit - Georg P. Krog - Paul Ryan - Rob Brennan - Delaram Golpayegani - Beatriz Esteves - Julian Flake - 2.1-dev - 2.1-dev - https://w3id.org/dpv/risk - http://www.w3.org/2000/01/rdf-schema - http://www.w3.org/2004/02/skos/core - 10.5281/zenodo.12505841 - Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 - - - Harshvardhan J. Pandit - Georg P. Krog - Beatriz Esteves - Axel Polleres - Fajar Ekaputra - Delaram Golpayegani - Julian Flake - - risk - https://w3id.org/dpv/risk# - - - - - - - - - - - - - - - - - Guides for Data Privacy Vocabulary - - - - + - Malware Attack - Something that acts as or causes Malware Attack + Security Attack + Something that acts as or causes an attack on security with the aim of undermining it + + + - - 2022-08-17 - 2024-08-16 accepted - Harshvardhan J. Pandit - - - - - Examples for Data Privacy Vocabulary - - - - + - Legal Risk - Risks and issues that have their basis in legal requirements and enforcement + External Security Threat + Concepts associated with security threats that are likely to originate externally accepted - - - - - Violating Ethics Code - Something that acts as or causes Violation of Ethics Code - - This concept was called "ViolationEthicalCode" in DPV 2.0 - - 2022-08-17 - 2024-08-16 - modified - Harshvardhan J. Pandit - - - - + - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - - - Judicial Penalty - Something that involves or causes judicial penalties to be paid - - accepted - - + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - Injury - Something that acts as or causes Injury - - + Unwanted Code Deletion + Something that acts as or causes Unwanted Code Deletion + + + + 2022-08-17 2024-08-16 accepted @@ -1083,14 +1049,14 @@ - + - Authorisation Failure - Something that acts as or causes Authorisation Failure - - + Lose of Credibility + Something that acts as or causes Loss of Credibility + + 2022-08-17 2024-08-16 accepted @@ -1098,14 +1064,15 @@ - + - Lose of Trust - Something that acts as or causes Loss of Trust - - + Coercion + Something that acts as or causes Coercion + + + 2022-08-17 2024-08-16 accepted @@ -1113,62 +1080,73 @@ - - - - - Primer for Data Privacy Vocabulary - - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - Unauthorised Information Disclosure - Something that acts as or causes Unauthorised Information Disclosure - - + Violation of Statutory Obligations + Something that acts as or causes Violation of Statutory Obligations + + This concept was called "ViolationStatutoryObligations" in DPV 2.0 + 2022-08-17 2024-08-16 - accepted + modified Harshvardhan J. Pandit - + + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - - Prevent Exercising of Rights - Something that acts as or causes Prevent Exercising of Rights - - This concept was called "PreventExercisingOfRights" in DPV 2.0 - 2022-08-18 - 2024-08-16 + + Component Failure + Something that acts as or causes Component Failure + + + Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of accepted - Georg P. Krog, Harshvardhan J. Pandit - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - Lose of Customer Confidence - Something that acts as or causes Loss of Customer Confidence + Lose of Negotiating Capacity + Something that acts as or causes Loss of Negotiating Capacity - + 2022-08-17 2024-08-16 accepted @@ -1176,35 +1154,31 @@ - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - User Risks - Concepts associated with risks that arise due to User or Human use - + Erroneous System Use + Something that acts as or causes Erroneous System Use + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - Unauthorised Access to Premises - Something that acts as or causes Unauthorised Access to Premises - - + System Malfunction + Something that acts as or causes System Malfunction + + + Here system refers to both hardware and software systems + 2022-08-17 2024-08-16 accepted @@ -1212,14 +1186,20 @@ - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - Extorsion - Something that acts as or causes Extorsion + Phishing Scam + Something that acts as or causes Phishing Scam + - + 2022-08-17 2024-08-16 accepted @@ -1227,28 +1207,30 @@ - + - Benefit - Something that acts as or causes benefits - - 2022-03-23 + Illegal Data Processing + Something that acts as or causes Illegal Processing of Data + + This concept was called "IllegalProcessingData" in DPV 2.0 + + 2022-08-17 2024-08-16 accepted - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres + Harshvardhan J. Pandit - + - Distributed Denial of Service Attack (DDoS) - Something that acts as or causes Distributed Denial of Service Attack (DDoS) - - + Lose of Customer Confidence + Something that acts as or causes Loss of Customer Confidence + + 2022-08-17 2024-08-16 accepted @@ -1256,67 +1238,53 @@ - + - Lose of Credibility - Something that acts as or causes Loss of Credibility - - + Violating Code of Conduct + Something that acts as or causes Violation of Code of Conduct + + This concept was called "ViolationCodeConduct" in DPV 2.0 + 2022-08-17 2024-08-16 - accepted + modified Harshvardhan J. Pandit - + - Compromise Account - Something that acts as or causes a compromised account that is then used by the compromiser - - - 2022-08-17 - 2024-08-16 + Societal Health & Safety + accepted - Harshvardhan J. Pandit - - - ENISA Threat Landscape 2021 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 - - + - Spoofing - Something that acts as or causes Spoofing - - - - - 2022-08-17 - 2024-08-16 + Judicial Penalty + Something that involves or causes judicial penalties to be paid + accepted - Harshvardhan J. Pandit - + - Illegal Data Processing - Something that acts as or causes Illegal Processing of Data - - This concept was called "IllegalProcessingData" in DPV 2.0 - + Unauthorised Code Access + Something that acts as or causes Unauthorised Code Access + + + + 2022-08-17 2024-08-16 accepted @@ -1324,19 +1292,22 @@ - + - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - Psychological Harm - Something that acts as or causes Psychological Harm - - + Security Breach + Something that acts as or causes Security Breach + + + + + 2022-08-17 2024-08-16 accepted @@ -1344,20 +1315,16 @@ - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - + - Denial of Service Attack (DoS) - Something that acts as or causes Denial of Service Attack (DoS) - - - + Impact to Rights + Something that acts as or causes Impact to Rights + + + This concept was called "ImpactToRights" in DPV 2.0 + 2022-08-17 2024-08-16 accepted @@ -1371,8 +1338,9 @@ Scam Something that acts as or causes Scam + - + 2022-08-17 2024-08-16 accepted @@ -1380,30 +1348,37 @@ - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + + + + Risk Concepts - N3 serialiation - + - Privacy - + Social Disadvantage + Something that acts as or causes Social Disadvantage + + 2022-08-19 + 2024-08-16 accepted + Georg P. Krog - + - System Malfunction - Something that acts as or causes System Malfunction + Identity Theft + Something that acts as or causes Identity Theft + - Here system refers to both hardware and software systems - + 2022-08-17 2024-08-16 accepted @@ -1411,27 +1386,17 @@ - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - - - - - - Risk Concepts - JSON-LD serialiation - - + - Vulnerability Created - Something that acts as or causes Vulnerability Created - - + Malware Attack + Something that acts as or causes Malware Attack + + + + + 2022-08-17 2024-08-16 accepted @@ -1439,14 +1404,40 @@ - + - Blackmail - Something that acts as or causes Blackmail - - + Payment + Something that acts as or provides payment e.g. to access a service or purchase resources + + 2024-04-14 + 2024-08-16 + accepted + Georg P. Krog, Harshvardhan J. Pandit + + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + + Authorisation Failure + Something that acts as or causes Authorisation Failure + + + + 2022-08-17 2024-08-16 accepted @@ -1454,16 +1445,27 @@ - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - + Terrorism + Something that acts as or causes Terrorism + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html @@ -1476,39 +1478,35 @@ Risk Concepts - RDF/XML serialiation - - - - - Unauthorised Data Access - Something that acts as or causes Unauthorised Data Access - - - 2022-08-17 - 2024-08-16 - accepted - Harshvardhan J. Pandit - - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - + Violating Policy + Something that acts as or causes violation of policy which can be either internal or external policy + accepted - + - Equipment Malfunction - Something that acts as or causes Equipment Malfunction - - Here equipment refers to physical equipment - + Lose of Goodwill + Something that acts as or causes Loss of Goodwill + + 2022-08-17 2024-08-16 accepted @@ -1516,70 +1514,45 @@ - + - Unauthorised System Modification - Something that acts as or causes Unauthorised System Modification - - - 2022-08-17 + Limitation of Rights + Something that acts as or causes Limitation of Rights + + This concept was called "LimitationOfRights" in DPV 2.0 + 2022-08-18 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog, Harshvardhan J. Pandit - + - Unwanted Code Deletion - Something that acts as or causes Unwanted Code Deletion - - - 2022-08-17 + Violation of Rights + Something that acts as or causes Violation of Rights + + This concept was called "ViolationOfRights" in DPV 2.0 + 2022-08-18 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog, Harshvardhan J. Pandit - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - + - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - - - Unauthorised System Access - Something that acts as or causes Unauthorised System Access - - - 2022-08-17 - 2024-08-16 - accepted - Harshvardhan J. Pandit - - + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view @@ -1587,8 +1560,9 @@ Unauthorised Resource Use Something that acts as or causes Unauthorised Resource Use + - + 2022-08-17 2024-08-16 accepted @@ -1596,14 +1570,28 @@ - + + + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - Unauthorised Data Modification - Something that acts as or causes Unauthorised Data Modification + Spoofing + Something that acts as or causes Spoofing + + - + + + 2022-08-17 2024-08-16 accepted @@ -1611,28 +1599,33 @@ - + - Unauthorised Code Modification - Something that acts as or causes Unauthorised Code Modification - - - 2022-08-17 + Remuneration + Something that acts as or provides renumeration which is in monetary or financial form + + 2024-04-14 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog, Harshvardhan J. Pandit - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - Discrimination - Something that acts as or causes Discrimination - + Unauthorised Re-Identification + Something that acts as or causes Unauthorised Re-Identification + + 2022-08-19 2024-08-16 accepted @@ -1640,72 +1633,56 @@ - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - Individual Health & Safety - + Societal Risk + Risks and issues that affect or have the potential to affect society at large or specific groups in society + accepted - + - Reward - Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee - - 2024-04-14 - 2024-08-16 + Accidental Misuse + Accidental Misuse + accepted - Georg P. Krog, Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - - - - - Risk Concepts - N3 serialiation - - + - Intentional Misuse - Intentional Misuse - + + accepted - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - Unauthorised Code Disclosure - Something that acts as or causes Unauthorised Code Disclosure - - + Sexual Violence + Something that acts as or causes Sexual Violence + + 2022-08-17 2024-08-16 accepted @@ -1713,19 +1690,25 @@ - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - System Intrusion - Something that acts as or causes System Intrusion + Unauthorised Information Disclosure + Something that acts as or causes Unauthorised Information Disclosure + - + 2022-08-17 2024-08-16 accepted @@ -1733,57 +1716,50 @@ - + - Accidental Misuse - Accidental Misuse - + User Risks + Concepts associated with risks that arise due to User or Human use + accepted - + - Environmental Risk - Risks and issues that have their origin in environment or can affect the environment at large - + Material Damage + Something that acts as or causes Material Damage + + The criteria for what is considered material damage is based in jurisdictional laws and norms + 2022-03-30 + 2024-08-16 accepted + Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - - Data Corruption - Something that acts as or causes Corruption of Data - - This concept was called "Corruption Data" in DPV 2.0 - - 2022-08-17 - 2024-08-16 - modified - Harshvardhan J. Pandit + Individual Risk + Risks and issues that affect or have the potential to affect specific individuals + accepted - + - Terrorism - Something that acts as or causes Terrorism - - + Unauthorised System Modification + Something that acts as or causes Unauthorised System Modification + + + 2022-08-17 2024-08-16 accepted @@ -1791,77 +1767,74 @@ - + - Component Failure - Something that acts as or causes Component Failure - - Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of + Environmental Risk + Risks and issues that have their origin in environment or can affect the environment at large + accepted - - - - - Fee - Something that acts as or provides fees e.g. for using a service - - DGA 2.10 - 2024-04-14 - 2024-08-16 - modified - Georg P. Krog, Harshvardhan J. Pandit - - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - Internal Security Threat - Concepts associated with security threats and issues that originate within the organisation - + Human Errors + Something that acts as or causes Human Errors + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - Harm - Something that acts as or causes Harm to humans - - This concept refers to the general abstract notion of harm - 2022-08-13 - 2024-08-16 + Unauthorised Activity + Something that acts as or causes Unauthorised Activity + + + + accepted - Harshvardhan J. Pandit - + - Brute Force Authorisations - Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques - - + Physical Assault + Something that acts as or causes Physical Assault + + 2022-08-17 2024-08-16 accepted @@ -1869,127 +1842,194 @@ - - - - - Compensation - Something that acts as or provides compensation - which can be monetary and financial or in other forms - - 2024-04-14 - 2024-08-16 - accepted - Georg P. Krog, Harshvardhan J. Pandit - - + + + + + + + Risk Concepts - Turtle serialiation - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + + Primer for Data Privacy Vocabulary + + + + + + + + Equipment Failure + Something that acts as or causes Equipment Failure + + + Here equipment refers to physical equipment + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + + + + + Unauthorised System Access + Something that acts as or causes Unauthorised System Access + + + + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + + + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Threat Landscape 2021 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 - + - Security Attack - Something that acts as or causes an attack on security with the aim of undermining it - + Reward + Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + + 2024-04-14 + 2024-08-16 accepted + Georg P. Krog, Harshvardhan J. Pandit - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + + + Examples for Data Privacy Vocabulary + + + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + + + + + + + Risk Concepts - JSON-LD serialiation + + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - Individual Risk - Risks and issues that affect or have the potential to affect specific individuals + + Legal Risk + Risks and issues that have their basis in legal requirements and enforcement + accepted - + - Misuse - Something that acts as or causes Misuse - - 2024-06-11 - 2024-08-16 + Physical Harm + accepted - Delaram Golpayegani - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - ENISA Threat Landscape for Ransomware Attacks 2022 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + + + + + Compensation + Something that acts as or provides compensation - which can be monetary and financial or in other forms + + 2024-04-14 + 2024-08-16 + accepted + Georg P. Krog, Harshvardhan J. Pandit + + - + - Violation of Rights - Something that acts as or causes Violation of Rights + Prevent Exercising of Rights + Something that acts as or causes Prevent Exercising of Rights - This concept was called "ViolationOfRights" in DPV 2.0 + This concept was called "PreventExercisingOfRights" in DPV 2.0 2022-08-18 2024-08-16 accepted @@ -1997,128 +2037,128 @@ - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Threat Landscape for Ransomware Attacks 2022 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + + + ENISA Threat Landscape for Ransomware Attacks 2022 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + + - Operational Security Risk - Risks and issues that arise during operational processes - + Individual Health & Safety + accepted - + - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ENISA Reference Incident Classification Taxonomy 2018 https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + + Guides for Data Privacy Vocabulary + + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - ENISa Trust Services Security Incidents 2021 - https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + + + + Risk Concepts - HTML serialiation - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - - - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - + - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ENISA Methodology for Sectoral Cybersecurity Assessments https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment diff --git a/2.1-dev/risk/modules/risk_consequences.ttl b/2.1-dev/risk/modules/risk_consequences.ttl index b23e5df5b..87558834f 100644 --- a/2.1-dev/risk/modules/risk_consequences.ttl +++ b/2.1-dev/risk/modules/risk_consequences.ttl @@ -36,7 +36,9 @@ risk:AuthorisationFailure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Authorisation Failure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Authorisation Failure"@en . @@ -46,7 +48,8 @@ risk:AvailabilityBreach a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:DataBreach ; + skos:broader risk:AvailabilityConcept, + risk:DataBreach ; skos:inScheme risk:risk-consequences-classes . risk:Benefit a rdfs:Class, @@ -73,7 +76,8 @@ risk:Blackmail a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Blackmail"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Blackmail"@en . @@ -89,7 +93,9 @@ risk:BruteForceAuthorisations a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Brute Force Authorisations"@en . @@ -105,7 +111,8 @@ risk:Coercion a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Coercion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Coercion"@en . @@ -128,7 +135,8 @@ risk:ComponentFailure a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Component Failure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Component Failure"@en ; @@ -139,7 +147,8 @@ risk:ComponentMalfunction a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Component Malfunction"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Component Malfunction"@en ; @@ -156,7 +165,10 @@ risk:CompromiseAccount a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Compromise Account"@en . @@ -172,7 +184,8 @@ risk:CompromiseAccountCredentials a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:ConfidentialityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Compromise Account Credentials"@en . @@ -188,7 +201,8 @@ risk:ConfidentialityBreach a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:DataBreach ; + skos:broader risk:ConfidentialityConcept, + risk:DataBreach ; skos:definition "Something that acts as or causes Confidentiality Breach"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Confidentiality Breach"@en . @@ -220,7 +234,8 @@ risk:Cryptojacking a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Cryptojacking"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Cryptojacking"@en . @@ -251,7 +266,10 @@ risk:DataBreach a rdfs:Class, dex:E0071 ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SecurityBreach ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:SecurityBreach ; skos:definition "Something that acts as or causes Data Breach"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Data Breach"@en . @@ -267,7 +285,8 @@ risk:DataCorruption a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:IntegrityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Corruption of Data"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Data Corruption"@en ; @@ -280,14 +299,12 @@ risk:DenialServiceAttack a rdfs:Class, dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ], - [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Denial of Service Attack (DoS)"@en . @@ -329,7 +346,8 @@ risk:DistributedDenialServiceAttack a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en . @@ -355,7 +373,8 @@ risk:EquipmentFailure a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Equipment Failure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Equipment Failure"@en ; @@ -372,7 +391,8 @@ risk:EquipmentMalfunction a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Equipment Malfunction"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Equipment Malfunction"@en ; @@ -432,7 +452,8 @@ risk:Extorsion a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Extorsion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Extorsion"@en . @@ -488,7 +509,8 @@ risk:Fraud a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Fraud"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Fraud"@en . @@ -534,7 +556,8 @@ risk:IdentityFraud a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:ConfidentialityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Identity Fraud"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Identity Fraud"@en . @@ -550,7 +573,8 @@ risk:IdentityTheft a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:ConfidentialityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Identity Theft"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Identity Theft"@en . @@ -610,7 +634,8 @@ risk:IntegrityBreach a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:DataBreach ; + skos:broader risk:DataBreach, + risk:IntegrityConcept ; skos:inScheme risk:risk-consequences-classes . risk:IntentionalMisuse a rdfs:Class, @@ -634,22 +659,13 @@ risk:InterceptCommunications a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Interception of Communications"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Intercept Communications"@en ; skos:scopeNote "This concept was called \"InterceptionCommunications\" in DPV 2.0"@en . -risk:InternalSecurityThreat a rdfs:Class, - skos:Concept, - dpv:RiskConcept ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader dpv:RiskConcept ; - skos:definition "Concepts associated with security threats and issues that originate within the organisation"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Internal Security Threat"@en . - risk:JudicialCosts a rdfs:Class, skos:Concept, dpv:RiskConcept ; @@ -803,7 +819,10 @@ risk:MaliciousCodeAttack a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Malicious Code Attack"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Malicious Code Attack"@en . @@ -819,7 +838,10 @@ risk:MalwareAttack a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Malware Attack"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Malware Attack"@en . @@ -915,7 +937,8 @@ risk:PhishingScam a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Phishing Scam"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Phishing Scam"@en . @@ -994,7 +1017,8 @@ risk:Reidentification a rdfs:Class, dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:ConfidentialityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Re-identification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Re-identification"@en ; @@ -1107,7 +1131,9 @@ risk:Sabotage a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Sabotage"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Sabotage"@en . @@ -1123,7 +1149,8 @@ risk:Scam a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Scam"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Scam"@en . @@ -1133,7 +1160,10 @@ risk:SecurityAttack a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Security Attack"@en . @@ -1149,7 +1179,10 @@ risk:SecurityBreach a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Security Breach"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Security Breach"@en . @@ -1216,7 +1249,9 @@ risk:Spoofing a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat, + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept, risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Spoofing"@en ; skos:inScheme risk:risk-consequences-classes ; @@ -1233,7 +1268,8 @@ risk:SystemFailure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes System Failure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "System Failure"@en ; @@ -1250,7 +1286,10 @@ risk:SystemIntrusion a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes System Intrusion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "System Intrusion"@en . @@ -1266,7 +1305,8 @@ risk:SystemMalfunction a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes System Malfunction"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "System Malfunction"@en ; @@ -1299,7 +1339,10 @@ risk:UnauthorisedAccesstoPremises a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Access to Premises"@en . @@ -1309,7 +1352,10 @@ risk:UnauthorisedActivity a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised Activity"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Activity"@en . @@ -1325,7 +1371,9 @@ risk:UnauthorisedCodeAccess a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised Code Access"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Code Access"@en . @@ -1341,7 +1389,8 @@ risk:UnauthorisedCodeDisclosure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Code Disclosure"@en . @@ -1357,7 +1406,8 @@ risk:UnauthorisedCodeModification a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Code Modification"@en . @@ -1373,7 +1423,8 @@ risk:UnauthorisedDataAccess a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Data Access"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Data Access"@en . @@ -1389,7 +1440,8 @@ risk:UnauthorisedDataDisclosure a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Data Disclosure"@en . @@ -1405,7 +1457,8 @@ risk:UnauthorisedDataModification a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Data Modification"@en . @@ -1421,7 +1474,8 @@ risk:UnauthorisedInformationDisclosure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Information Disclosure"@en . @@ -1434,7 +1488,8 @@ risk:UnauthorisedReidentification a rdfs:Class, dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Re-Identification"@en . @@ -1450,7 +1505,8 @@ risk:UnauthorisedResourceUse a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Resource Use"@en . @@ -1466,7 +1522,9 @@ risk:UnauthorisedSystemAccess a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised System Access"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised System Access"@en . @@ -1482,7 +1540,8 @@ risk:UnauthorisedSystemModification a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised System Modification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised System Modification"@en . @@ -1498,7 +1557,9 @@ risk:UnwantedCodeDeletion a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unwanted Code Deletion"@en . @@ -1514,7 +1575,9 @@ risk:UnwantedDataDeletion a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unwanted Data Deletion"@en . @@ -1530,7 +1593,8 @@ risk:UnwantedDisclosureData a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unwanted Disclosure of Data"@en . @@ -1657,22 +1721,6 @@ risk:ViolenceAgainstChildren a rdfs:Class, skos:prefLabel "Violence against children"@en ; skos:scopeNote "This concept was called \"ChildViolence\" in DPV 2.0"@en . -risk:VulnerabilityCreated a rdfs:Class, - skos:Concept, - dpv:RiskConcept ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:modified "2024-08-16"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:InternalSecurityThreat ; - skos:definition "Something that acts as or causes Vulnerability Created"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Vulnerability Created"@en . - a owl:Ontology, profile:Profile ; dct:bibliographicCitation "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" ; diff --git a/2.1-dev/risk/risk-en.html b/2.1-dev/risk/risk-en.html index c8b42bf5f..4efbea699 100644 --- a/2.1-dev/risk/risk-en.html +++ b/2.1-dev/risk/risk-en.html @@ -1271,92 +1271,77 @@

Consequences and Impacts

dpv:hasImpact risk:RightsImpact . -

The risk concepts taxonomy is broadly divided into the following categories:

+

The concepts taxonomy is broadly divided into the following categories:

-
-

InternalSecurityThreat

-
    +
    +

    CIA Model

    +

    Confidentiality

    +
    • - risk:VulnerabilityCreated: Something that acts as or causes Vulnerability Created - go to full definition + risk:AuthorisationFailure: Something that acts as or causes Authorisation Failure + go to full definition
    • -
    -
    -
    -

    UserRisks

    -
    -
    -
    -

    ExternalSecurityThreat

    -
    • - risk:Blackmail: Something that acts as or causes Blackmail - go to full definition + risk:ConfidentialityBreach: Something that acts as or causes Confidentiality Breach + go to full definition
    • - risk:BruteForceAuthorisations: Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques - go to full definition - -
    • + risk:DataBreach: Something that acts as or causes Data Breach + go to full definition +
    • risk:Extorsion: Something that acts as or causes Extorsion @@ -1367,6 +1352,16 @@

      ExternalSecurityThreat

      risk:Fraud: Something that acts as or causes Fraud go to full definition +
    • +
    • + risk:IdentityFraud: Something that acts as or causes Identity Fraud + go to full definition + +
    • +
    • + risk:IdentityTheft: Something that acts as or causes Identity Theft + go to full definition +
    • risk:InterceptCommunications: Something that acts as or causes Interception of Communications @@ -1389,8 +1384,8 @@

      ExternalSecurityThreat

    • - risk:Sabotage: Something that acts as or causes Sabotage - go to full definition + risk:Reidentification: Something that acts as or causes Re-identification + go to full definition
    • @@ -1402,6 +1397,33 @@

      ExternalSecurityThreat

      risk:SecurityAttack: Something that acts as or causes an attack on security with the aim of undermining it go to full definition +
    • +
    • + risk:SecurityBreach: Something that acts as or causes Security Breach + go to full definition +
    • risk:Spoofing: Something that acts as or causes Spoofing @@ -1432,11 +1454,6 @@

      ExternalSecurityThreat

      risk:UnauthorisedCodeDisclosure: Something that acts as or causes Unauthorised Code Disclosure go to full definition -
    • -
    • - risk:UnauthorisedCodeModification: Something that acts as or causes Unauthorised Code Modification - go to full definition -
    • risk:UnauthorisedDataAccess: Something that acts as or causes Unauthorised Data Access @@ -1447,11 +1464,6 @@

      ExternalSecurityThreat

      risk:UnauthorisedDataDisclosure: Something that acts as or causes Unauthorised Data Disclosure go to full definition -
    • -
    • - risk:UnauthorisedDataModification: Something that acts as or causes Unauthorised Data Modification - go to full definition -
    • risk:UnauthorisedInformationDisclosure: Something that acts as or causes Unauthorised Information Disclosure @@ -1464,8 +1476,145 @@

      ExternalSecurityThreat

    • - risk:UnauthorisedResourceUse: Something that acts as or causes Unauthorised Resource Use - go to full definition + risk:UnauthorisedSystemAccess: Something that acts as or causes Unauthorised System Access + go to full definition + +
    • +
    • + risk:UnwantedDisclosureData: Something that acts as or causes Unwanted Disclosure of Data + go to full definition + +
    • +
    + +

    Integrity

    +
    -
    -
    -

    OperationalSecurityRisk

    -
      + +

      Availability

      +
      • - risk:AuthorisationFailure: Something that acts as or causes Authorisation Failure - go to full definition + risk:AvailabilityBreach: None + go to full definition
      • @@ -1519,13 +1662,39 @@

        OperationalSecurityRisk

      • - risk:CompromiseAccountCredentials: Something that acts as or causes Account Credentials to be compromised - go to full definition + risk:Cryptojacking: Something that acts as or causes Cryptojacking + go to full definition
      • - risk:DataCorruption: Something that acts as or causes Corruption of Data - go to full definition + risk:DataBreach: Something that acts as or causes Data Breach + go to full definition + +
      • +
      • + risk:DenialServiceAttack: Something that acts as or causes Denial of Service Attack (DoS) + go to full definition + +
      • +
      • + risk:DistributedDenialServiceAttack: Something that acts as or causes Distributed Denial of Service Attack (DDoS) + go to full definition
      • @@ -1539,18 +1708,23 @@

        OperationalSecurityRisk

      • - risk:IdentityFraud: Something that acts as or causes Identity Fraud - go to full definition + risk:MaliciousCodeAttack: Something that acts as or causes Malicious Code Attack + go to full definition
      • - risk:IdentityTheft: Something that acts as or causes Identity Theft - go to full definition + risk:MalwareAttack: Something that acts as or causes Malware Attack + go to full definition
      • - risk:Reidentification: Something that acts as or causes Re-identification - go to full definition + risk:Sabotage: Something that acts as or causes Sabotage + go to full definition + +
      • +
      • + risk:SecurityAttack: Something that acts as or causes an attack on security with the aim of undermining it + go to full definition
      • @@ -1581,13 +1755,13 @@

        OperationalSecurityRisk

    • - risk:Spoofing: Something that acts as or causes Spoofing - go to full definition + risk:SystemFailure: Something that acts as or causes System Failure + go to full definition
    • - risk:SystemFailure: Something that acts as or causes System Failure - go to full definition + risk:SystemIntrusion: Something that acts as or causes System Intrusion + go to full definition
    • @@ -1595,11 +1769,68 @@

      OperationalSecurityRisk

      go to full definition
    • +
    • + risk:UnauthorisedAccesstoPremises: Something that acts as or causes Unauthorised Access to Premises + go to full definition + +
    • +
    • + risk:UnauthorisedActivity: Something that acts as or causes Unauthorised Activity + go to full definition + +
    • +
    • + risk:UnauthorisedResourceUse: Something that acts as or causes Unauthorised Resource Use + go to full definition + +
    • +
    • + risk:UnwantedCodeDeletion: Something that acts as or causes Unwanted Code Deletion + go to full definition + +
    • +
    • + risk:UnwantedDataDeletion: Something that acts as or causes Unwanted Data Deletion + go to full definition + +
    -
    -
    -

    LegalRisk

    -
      +
    + +
    +

    User

    +
    +
    + +
    +

    Legal

    +
    • risk:CopyrightViolation: Something that acts as or causes Copyright Violation go to full definition @@ -1666,10 +1897,11 @@

      LegalRisk

    -
    -
    -

    ReputationalRisk

    -
      +
    + +
    +

    Reputational

    +
    • risk:LoseCredibility: Something that acts as or causes Loss of Credibility go to full definition @@ -1706,10 +1938,11 @@

      ReputationalRisk

    -
    -
    -

    SocietalRisk

    -
      +
    + +
    +

    Societal

    +
    • risk:Discrimination: Something that acts as or causes Discrimination go to full definition @@ -1761,10 +1994,11 @@

      SocietalRisk

    -
    -
    -

    IndividualRisk

    -
      +
    + +
    +

    Individual

    +
    • risk:Harm: Something that acts as or causes Harm to humans go to full definition @@ -1811,14 +2045,16 @@

      IndividualRisk

    -
    -
    -

    EnvironmentalRisk

    -
    -
    -
    -

    FinancialImpact

    -
      +
    + +
    +

    Environmental

    +
    +
    + +
    +

    Financial

    +
    • risk:Benefit: Something that acts as or causes benefits go to full definition @@ -1865,7 +2101,7 @@

      FinancialImpact

    -
    +
@@ -2128,8 +2364,6 @@

Classes

- - @@ -3007,6 +3241,12 @@

Authorisation Failure

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types + risk:IntegrityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -3088,6 +3328,33 @@

None

Broader/Parent types + risk:DataBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:IntegrityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:IntegrityConcept + + Broader/Parent types risk:DataBreachrisk:SecurityBreachrisk:OperationalSecurityRisk @@ -3392,6 +3659,9 @@

Blackmail

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -3473,8 +3743,14 @@

Brute Force Authorisations

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -3724,6 +4000,9 @@

Coercion

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -3883,6 +4162,9 @@

Component Failure

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -3955,6 +4237,9 @@

Component Malfunction

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -4027,6 +4312,15 @@

Compromise Account

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types + risk:IntegrityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -4108,6 +4402,9 @@

Compromise Account Credentials

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -4189,6 +4486,33 @@

Confidentiality Breach

Broader/Parent types + risk:DataBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:IntegrityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:IntegrityConcept + + Broader/Parent types risk:DataBreachrisk:SecurityBreachrisk:OperationalSecurityRisk @@ -4666,6 +4990,9 @@

Cryptojacking

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -4825,6 +5152,18 @@

Data Breach

Broader/Parent types + risk:SecurityBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:SecurityBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:SecurityBreach + → risk:IntegrityConcept + + Broader/Parent types risk:SecurityBreachrisk:OperationalSecurityRiskdpv:RiskConcept @@ -4910,6 +5249,9 @@

Data Corruption

Broader/Parent types + risk:IntegrityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -5069,6 +5411,9 @@

Denial of Service Attack (DoS)

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -5092,7 +5437,7 @@

Denial of Service Attack (DoS)

Source - ISO/IEC 27005:2018, ISO/IEC 27005:2018 + ISO/IEC 27005:2018 @@ -5385,6 +5730,9 @@

Distributed Denial of Service Attack (DDoS)

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -5609,6 +5957,9 @@

Equipment Failure

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -5693,6 +6044,9 @@

Equipment Malfunction

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -6012,6 +6366,9 @@

Extorsion

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -6815,6 +7172,9 @@

Fraud

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -7499,6 +7859,9 @@

Identity Fraud

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -7580,6 +7943,9 @@

Identity Theft

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -7862,7 +8228,7 @@

Incident

Date Created - 2024-02-14 + 2024-05-19 Date Modified @@ -9873,6 +10239,33 @@

None

Broader/Parent types + risk:DataBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:IntegrityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:IntegrityConcept + + Broader/Parent types risk:DataBreachrisk:SecurityBreachrisk:OperationalSecurityRisk @@ -10085,6 +10478,9 @@

Intercept Communications

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -10141,74 +10537,6 @@

Intercept Communications

-
-

Internal Security Threat

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
TermInternalSecurityThreatPrefixrisk
LabelInternal Security Threat
IRIhttps://w3id.org/dpv/risk#InternalSecurityThreat
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types dpv:RiskConcept -
DefinitionConcepts associated with security threats and issues that originate within the organisation
See More: section RISK-CONSEQUENCES in RISK -
-
- - - @@ -11284,8 +11612,17 @@

Malicious Code Attack

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -11365,8 +11702,17 @@

Malware Attack

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -12766,6 +13112,9 @@

Phishing Scam

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -13544,6 +13893,9 @@

Re-identification

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -21592,8 +21944,14 @@

Sabotage

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -21673,6 +22031,9 @@

Scam

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -21754,8 +22115,17 @@

Security Attack

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -21823,6 +22193,15 @@

Security Breach

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types + risk:IntegrityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -22365,10 +22744,16 @@

Spoofing

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept Broader/Parent types + risk:IntegrityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -22450,6 +22835,9 @@

System Failure

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -22534,8 +22922,17 @@

System Intrusion

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -22615,6 +23012,9 @@

System Malfunction

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -22933,8 +23333,17 @@

Unauthorised Access to Premises

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23014,8 +23423,17 @@

Unauthorised Activity

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23083,8 +23501,14 @@

Unauthorised Code Access

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23164,6 +23588,9 @@

Unauthorised Code Disclosure

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23247,6 +23674,9 @@

Unauthorised Code Modification

Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23326,6 +23756,9 @@

Unauthorised Data Access

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23407,6 +23840,9 @@

Unauthorised Data Disclosure

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23490,6 +23926,9 @@

Unauthorised Data Modification

Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23569,6 +24008,9 @@

Unauthorised Information Disclosure

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23650,6 +24092,9 @@

Unauthorised Re-Identification

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23728,6 +24173,9 @@

Unauthorised Resource Use

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23809,8 +24257,14 @@

Unauthorised System Access

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23892,6 +24346,9 @@

Unauthorised System Modification

Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23971,8 +24428,14 @@

Unwanted Code Deletion

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -24052,8 +24515,14 @@

Unwanted Data Deletion

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -24133,6 +24602,9 @@

Unwanted Disclosure of Data

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -25417,87 +25889,6 @@

Vulnerability

- - - -
-

Vulnerability Created

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
TermVulnerabilityCreatedPrefixrisk
LabelVulnerability Created
IRIhttps://w3id.org/dpv/risk#VulnerabilityCreated
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:InternalSecurityThreat - → dpv:RiskConcept -
DefinitionSomething that acts as or causes Vulnerability Created
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK -
-
@@ -25630,8 +26021,6 @@

Properties

- - @@ -26435,9 +26824,6 @@

has vulnerability

- - - @@ -27237,9 +27623,6 @@

refers to risk

- - - @@ -27334,8 +27717,6 @@

External

- - @@ -27637,9 +28018,6 @@

External

- - - @@ -28223,9 +28601,6 @@

External

- - -
diff --git a/2.1-dev/risk/risk-owl.html b/2.1-dev/risk/risk-owl.html index 117288ffd..25592e7bc 100644 --- a/2.1-dev/risk/risk-owl.html +++ b/2.1-dev/risk/risk-owl.html @@ -437,8 +437,6 @@

Classes

- - @@ -1342,6 +1340,12 @@

Authorisation Failure

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of + risk-owl:IntegrityConcept + + Sub-class of risk-owl:OperationalSecurityRiskdpv-owl:RiskConcept @@ -1425,6 +1429,33 @@

None

Sub-class of + risk-owl:DataBreach + → risk-owl:AvailabilityConcept + + Sub-class of + risk-owl:DataBreach + → risk-owl:ConfidentialityConcept + + Sub-class of + risk-owl:DataBreach + → risk-owl:IntegrityConcept + + Sub-class of + risk-owl:DataBreach + → risk-owl:SecurityBreach + → risk-owl:AvailabilityConcept + + Sub-class of + risk-owl:DataBreach + → risk-owl:SecurityBreach + → risk-owl:ConfidentialityConcept + + Sub-class of + risk-owl:DataBreach + → risk-owl:SecurityBreach + → risk-owl:IntegrityConcept + + Sub-class of risk-owl:DataBreachrisk-owl:SecurityBreachrisk-owl:OperationalSecurityRisk @@ -1736,6 +1767,9 @@

Blackmail

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept @@ -1819,8 +1853,14 @@

Brute Force Authorisations

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept + + Sub-class of + risk-owl:IntegrityConcept @@ -2076,6 +2116,9 @@

Coercion

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept @@ -2239,6 +2282,9 @@

Component Failure

Sub-class of + risk-owl:AvailabilityConcept + + Sub-class of risk-owl:OperationalSecurityRiskdpv-owl:RiskConcept @@ -2313,6 +2359,9 @@

Component Malfunction

Sub-class of + risk-owl:AvailabilityConcept + + Sub-class of risk-owl:OperationalSecurityRiskdpv-owl:RiskConcept @@ -2387,6 +2436,15 @@

Compromise Account

Sub-class of + risk-owl:AvailabilityConcept + + Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of + risk-owl:IntegrityConcept + + Sub-class of risk-owl:OperationalSecurityRiskdpv-owl:RiskConcept @@ -2470,6 +2528,9 @@

Compromise Account Credentials

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:OperationalSecurityRiskdpv-owl:RiskConcept @@ -2553,6 +2614,33 @@

Confidentiality Breach

Sub-class of + risk-owl:DataBreach + → risk-owl:AvailabilityConcept + + Sub-class of + risk-owl:DataBreach + → risk-owl:ConfidentialityConcept + + Sub-class of + risk-owl:DataBreach + → risk-owl:IntegrityConcept + + Sub-class of + risk-owl:DataBreach + → risk-owl:SecurityBreach + → risk-owl:AvailabilityConcept + + Sub-class of + risk-owl:DataBreach + → risk-owl:SecurityBreach + → risk-owl:ConfidentialityConcept + + Sub-class of + risk-owl:DataBreach + → risk-owl:SecurityBreach + → risk-owl:IntegrityConcept + + Sub-class of risk-owl:DataBreachrisk-owl:SecurityBreachrisk-owl:OperationalSecurityRisk @@ -3040,6 +3128,9 @@

Cryptojacking

Sub-class of + risk-owl:AvailabilityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept @@ -3203,6 +3294,18 @@

Data Breach

Sub-class of + risk-owl:SecurityBreach + → risk-owl:AvailabilityConcept + + Sub-class of + risk-owl:SecurityBreach + → risk-owl:ConfidentialityConcept + + Sub-class of + risk-owl:SecurityBreach + → risk-owl:IntegrityConcept + + Sub-class of risk-owl:SecurityBreachrisk-owl:OperationalSecurityRiskdpv-owl:RiskConcept @@ -3292,6 +3395,9 @@

Data Corruption

Sub-class of + risk-owl:IntegrityConcept + + Sub-class of risk-owl:OperationalSecurityRiskdpv-owl:RiskConcept @@ -3454,6 +3560,9 @@

Denial of Service Attack (DoS)

Sub-class of + risk-owl:AvailabilityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept @@ -3477,7 +3586,7 @@

Denial of Service Attack (DoS)

Source - ISO/IEC 27005:2018,ISO/IEC 27005:2018 + ISO/IEC 27005:2018 @@ -3778,6 +3887,9 @@

Distributed Denial of Service Attack (DDoS)

Sub-class of + risk-owl:AvailabilityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept @@ -4007,6 +4119,9 @@

Equipment Failure

Sub-class of + risk-owl:AvailabilityConcept + + Sub-class of risk-owl:OperationalSecurityRiskdpv-owl:RiskConcept @@ -4093,6 +4208,9 @@

Equipment Malfunction

Sub-class of + risk-owl:AvailabilityConcept + + Sub-class of risk-owl:OperationalSecurityRiskdpv-owl:RiskConcept @@ -4420,6 +4538,9 @@

Extorsion

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept @@ -5243,6 +5364,9 @@

Fraud

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept @@ -5943,6 +6067,9 @@

Identity Fraud

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:OperationalSecurityRiskdpv-owl:RiskConcept @@ -6026,6 +6153,9 @@

Identity Theft

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:OperationalSecurityRiskdpv-owl:RiskConcept @@ -6315,7 +6445,7 @@

Incident

Date Created - 2024-02-14 + 2024-05-19 Date Modified @@ -8363,6 +8493,33 @@

None

Sub-class of + risk-owl:DataBreach + → risk-owl:AvailabilityConcept + + Sub-class of + risk-owl:DataBreach + → risk-owl:ConfidentialityConcept + + Sub-class of + risk-owl:DataBreach + → risk-owl:IntegrityConcept + + Sub-class of + risk-owl:DataBreach + → risk-owl:SecurityBreach + → risk-owl:AvailabilityConcept + + Sub-class of + risk-owl:DataBreach + → risk-owl:SecurityBreach + → risk-owl:ConfidentialityConcept + + Sub-class of + risk-owl:DataBreach + → risk-owl:SecurityBreach + → risk-owl:IntegrityConcept + + Sub-class of risk-owl:DataBreachrisk-owl:SecurityBreachrisk-owl:OperationalSecurityRisk @@ -8580,6 +8737,9 @@

Intercept Communications

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept @@ -8633,76 +8793,6 @@

Intercept Communications

-
-

Internal Security Threat

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
TermInternalSecurityThreatPrefixrisk-owl
LabelInternal Security Threat
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#InternalSecurityThreat
- https://w3id.org/dpv/risk#InternalSecurityThreat -
Type rdfs:Class - , owl:Class - , dpv-owl:RiskConcept -
Sub-class of dpv-owl:RiskConcept -
DefinitionConcepts associated with security threats and issues that originate within the organisation
Documented inRisk Risk-consequences
-
- - - @@ -9809,8 +9899,17 @@

Malicious Code Attack

Sub-class of + risk-owl:AvailabilityConcept + + Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept + + Sub-class of + risk-owl:IntegrityConcept @@ -9892,8 +9991,17 @@

Malware Attack

Sub-class of + risk-owl:AvailabilityConcept + + Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept + + Sub-class of + risk-owl:IntegrityConcept @@ -11327,6 +11435,9 @@

Phishing Scam

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept @@ -12125,6 +12236,9 @@

Re-identification

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:OperationalSecurityRiskdpv-owl:RiskConcept @@ -20377,8 +20491,14 @@

Sabotage

Sub-class of + risk-owl:AvailabilityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept + + Sub-class of + risk-owl:IntegrityConcept @@ -20460,6 +20580,9 @@

Scam

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept @@ -20543,8 +20666,17 @@

Security Attack

Sub-class of + risk-owl:AvailabilityConcept + + Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept + + Sub-class of + risk-owl:IntegrityConcept @@ -20614,6 +20746,15 @@

Security Breach

Sub-class of + risk-owl:AvailabilityConcept + + Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of + risk-owl:IntegrityConcept + + Sub-class of risk-owl:OperationalSecurityRiskdpv-owl:RiskConcept @@ -21170,10 +21311,16 @@

Spoofing

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept Sub-class of + risk-owl:IntegrityConcept + + Sub-class of risk-owl:OperationalSecurityRiskdpv-owl:RiskConcept @@ -21257,6 +21404,9 @@

System Failure

Sub-class of + risk-owl:AvailabilityConcept + + Sub-class of risk-owl:OperationalSecurityRiskdpv-owl:RiskConcept @@ -21343,8 +21493,17 @@

System Intrusion

Sub-class of + risk-owl:AvailabilityConcept + + Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept + + Sub-class of + risk-owl:IntegrityConcept @@ -21426,6 +21585,9 @@

System Malfunction

Sub-class of + risk-owl:AvailabilityConcept + + Sub-class of risk-owl:OperationalSecurityRiskdpv-owl:RiskConcept @@ -21750,8 +21912,17 @@

Unauthorised Access to Premises

Sub-class of + risk-owl:AvailabilityConcept + + Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept + + Sub-class of + risk-owl:IntegrityConcept @@ -21833,8 +22004,17 @@

Unauthorised Activity

Sub-class of + risk-owl:AvailabilityConcept + + Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept + + Sub-class of + risk-owl:IntegrityConcept @@ -21904,8 +22084,14 @@

Unauthorised Code Access

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept + + Sub-class of + risk-owl:IntegrityConcept @@ -21987,6 +22173,9 @@

Unauthorised Code Disclosure

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept @@ -22072,6 +22261,9 @@

Unauthorised Code Modification

Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept + + Sub-class of + risk-owl:IntegrityConcept @@ -22153,6 +22345,9 @@

Unauthorised Data Access

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept @@ -22236,6 +22431,9 @@

Unauthorised Data Disclosure

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept @@ -22321,6 +22519,9 @@

Unauthorised Data Modification

Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept + + Sub-class of + risk-owl:IntegrityConcept @@ -22402,6 +22603,9 @@

Unauthorised Information Disclosure

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept @@ -22485,6 +22689,9 @@

Unauthorised Re-Identification

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept @@ -22565,6 +22772,9 @@

Unauthorised Resource Use

Sub-class of + risk-owl:AvailabilityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept @@ -22648,8 +22858,14 @@

Unauthorised System Access

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept + + Sub-class of + risk-owl:IntegrityConcept @@ -22733,6 +22949,9 @@

Unauthorised System Modification

Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept + + Sub-class of + risk-owl:IntegrityConcept @@ -22814,8 +23033,14 @@

Unwanted Code Deletion

Sub-class of + risk-owl:AvailabilityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept + + Sub-class of + risk-owl:IntegrityConcept @@ -22897,8 +23122,14 @@

Unwanted Data Deletion

Sub-class of + risk-owl:AvailabilityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept + + Sub-class of + risk-owl:IntegrityConcept @@ -22980,6 +23211,9 @@

Unwanted Disclosure of Data

Sub-class of + risk-owl:ConfidentialityConcept + + Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept @@ -24290,89 +24524,6 @@

Vulnerability

- - - -
-

Vulnerability Created

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
TermVulnerabilityCreatedPrefixrisk-owl
LabelVulnerability Created
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#VulnerabilityCreated
- https://w3id.org/dpv/risk#VulnerabilityCreated -
Type rdfs:Class - , owl:Class - , dpv-owl:RiskConcept -
Sub-class of risk-owl:InternalSecurityThreat - → dpv-owl:RiskConcept -
DefinitionSomething that acts as or causes Vulnerability Created
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
Documented inRisk Risk-consequences
-
@@ -24505,8 +24656,6 @@

Properties

- - @@ -25318,9 +25467,6 @@

has vulnerability

- - - @@ -26124,9 +26270,6 @@

refers to risk

- - - @@ -26214,8 +26357,6 @@

External

- - @@ -26517,9 +26658,6 @@

External

- - - @@ -27103,9 +27241,6 @@

External

- - -
diff --git a/2.1-dev/risk/risk-owl.jsonld b/2.1-dev/risk/risk-owl.jsonld index 27ac672c1..34a2bbb69 100644 --- a/2.1-dev/risk/risk-owl.jsonld +++ b/2.1-dev/risk/risk-owl.jsonld @@ -1,20 +1,14 @@ [ { - "@id": "https://w3id.org/dpv/risk/owl#MonitorRiskSource", + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -24,7 +18,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -36,37 +30,57 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Source" + "@value": "Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Risk Source" + "@value": "Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L4", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://www.w3.org/TR/json-ld11/" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/format": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://www.iana.org/assignments/media-types/application/ld+json" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/title": [ { - "@value": "0.41,xsd:decimal" + "@value": "Risk Concepts - JSON-LD serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.jsonld" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IncidentSuspectedReport", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -76,7 +90,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -88,21 +102,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + "@value": "A report describing the suspicion of an incident in the past or occuring" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:5 L:4)" + "@value": "Incident Suspected Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L2", + "@id": "https://w3id.org/dpv/risk/owl#LoseOpportunity", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -116,9 +130,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.08,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N2ea871931e3746e4aff469f67008e44f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -128,7 +148,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -140,21 +160,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" + "@value": "Something that acts as or causes Loss of Opportunity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:1 L:2)" + "@value": "Lose of Opportunity" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorRiskControl", + "@id": "_:N2ea871931e3746e4aff469f67008e44f", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ViolatingLegalObligation", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -165,7 +201,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N0b5dd4cc254540f49140434e86708abb" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -175,30 +222,52 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors another Control" + "@value": "Something that acts as or causes Violation of Legal Obligations" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Control" + "@value": "Violation of Legal Obligations" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S2L1", + "@id": "_:N0b5dd4cc254540f49140434e86708abb", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L1", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -217,7 +286,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.22,xsd:decimal" + "@value": "0.04,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -227,7 +296,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -239,43 +308,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM3x3 S:2 L:1)" + "@value": "Very Low Risk (RM5x5 S:1 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Sabotage", + "@id": "https://w3id.org/dpv/risk/owl#IncidentNotice", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nddcd9454cd3f48779b8299743d6f1150" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -285,7 +337,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/owl#Notice" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -297,37 +349,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Sabotage" + "@value": "Notice associated with an Incident" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sabotage" - } - ] - }, - { - "@id": "_:Nddcd9454cd3f48779b8299743d6f1150", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Incident Notice" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SystemFailure", + "@id": "https://w3id.org/dpv/risk/owl#MaterialDamage", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -338,7 +374,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-30" } ], "http://purl.org/dc/terms/modified": [ @@ -347,11 +383,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Ndb0e0e85d6ad4dabbf9efc7a0f2cb59a" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -359,7 +390,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -371,43 +402,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Failure" + "@value": "Something that acts as or causes Material Damage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Failure" + "@value": "Material Damage" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Here system refers to both hardware and software systems" - } - ] - }, - { - "@id": "_:Ndb0e0e85d6ad4dabbf9efc7a0f2cb59a", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ReduceLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L4", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -418,7 +433,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -428,7 +448,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReductionControl" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -440,57 +460,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that reduces the likelihood of an event" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reduce Likelihood" + "@value": "Moderate Risk (RM7x7 S:3 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/examples", + "@id": "https://w3id.org/dpv/risk/owl#VeryLowLikelihood", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#Likelihood", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://www.w3.org/TR/html/" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Examples for Data Privacy Vocabulary" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/examples" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IncidentAssessmentReport", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "0.1,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -500,7 +500,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -512,39 +515,29 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the assessment of an incident in terms of its effects or impacts" + "@value": "Level where Likelihood is Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Assessment Report" + "@value": "Very Low Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L7", + "@id": "https://w3id.org/dpv/risk/owl#ComponentMalfunction", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.71,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -552,7 +545,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -564,21 +560,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High" + "@value": "Something that acts as or causes Component Malfunction" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:5 L:7)" + "@value": "Component Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#BruteForceAuthorisations", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L3", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -592,15 +594,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Ned6a23a4f6894305bc5d07abc6872b8e" + "@value": "0.48,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -610,7 +606,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -622,48 +618,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Brute Force Authorisations" - } - ] - }, - { - "@id": "_:Ned6a23a4f6894305bc5d07abc6872b8e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "High Risk (RM5x5 S:4 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels", + "@id": "https://w3id.org/dpv/risk/owl#IncidentConcludingReport", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -673,7 +647,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskLevel" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -685,43 +659,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 7 Risk Levels from Extremely High to Extremely Low" + "@value": "A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "7 Risk Levels" + "@value": "Incident Concluding Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedInformationDisclosure", + "@id": "https://w3id.org/dpv/risk/owl#DeliberateIncident", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nb2d6659136cf4d2fa881ae5798bf0e58" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -731,7 +688,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -743,37 +700,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Information Disclosure" + "@value": "Incident caused due to deliberate actions of a human" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Information Disclosure" - } - ] - }, - { - "@id": "_:Nb2d6659136cf4d2fa881ae5798bf0e58", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Deliberate Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ErroneousSystemUse", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S2L1", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -787,15 +728,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Ne874eff2b0f74da79392c36cf77d71f1" + "@value": "0.22,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -805,7 +740,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -817,37 +752,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Erroneous System Use" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Erroneous System Use" - } - ] - }, - { - "@id": "_:Ne874eff2b0f74da79392c36cf77d71f1", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Low Risk (RM3x3 S:2 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S2L2", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L4", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -863,7 +782,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.44,xsd:decimal" + "@value": "0.64,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -873,7 +792,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -885,21 +804,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM3x3 S:2 L:2)" + "@value": "Very High Risk (RM5x5 S:4 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels", + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -910,7 +829,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -920,7 +839,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Likelihood" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -932,21 +851,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 5 Likelihood Levels from Very High to Very Low" + "@value": "Risk Mitigation Measure that uses controls to monitor events" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "5 Likelihood Levels" + "@value": "Monitor Control" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised." } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels", + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityBreach", "@type": [ - "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -957,7 +882,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N0571680fc6554da2a384a2e851d510c0" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -967,7 +903,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Severity" + "@id": "https://w3id.org/dpv/risk/owl#DataBreach" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -979,43 +918,47 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 3 Severity Levels from High to Low" + "@value": "Something that acts as or causes Confidentiality Breach" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "3 Severity Levels" + "@value": "Confidentiality Breach" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityBreach", + "@id": "_:N0571680fc6554da2a384a2e851d510c0", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#causedByVulnerability", + "@type": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/created": [ { - "@id": "_:N804ad242900c474395dd117c74dace8e" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1023,11 +966,6 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#DataBreach" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -1037,34 +975,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Confidentiality Breach" + "@value": "Indicates the associated context (subject) is caused by the indicated vulnerability (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confidentiality Breach" - } - ] - }, - { - "@id": "_:N804ad242900c474395dd117c74dace8e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "caused by vulnerability" } ], - "https://schema.org/url": [ + "https://schema.org/rangeIncludes": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemAccess", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingStatutoryObligations", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -1089,7 +1016,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N4387faf4bb854435bfdc47ebf666782a" + "@id": "_:Ne3511d0b904a403e93b1538888ad1023" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1099,30 +1026,36 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised System Access" + "@value": "Something that acts as or causes Violation of Statutory Obligations" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised System Access" + "@value": "Violation of Statutory Obligations" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0" } ] }, { - "@id": "_:N4387faf4bb854435bfdc47ebf666782a", + "@id": "_:Ne3511d0b904a403e93b1538888ad1023", "@type": [ "https://schema.org/WebPage" ], @@ -1138,16 +1071,38 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L3", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.12,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -1157,32 +1112,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that affect or have the potential to affect specific individuals" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Individual Risk" + "@value": "Very Low Risk (RM7x7 S:2 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AvoidSource", + "@id": "https://w3id.org/dpv/risk/owl#RightsViolation", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1192,7 +1153,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SourceControl" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1204,21 +1165,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that avoids the risk source" + "@value": "Something that acts as or causes Violation of Rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Avoid Source" + "@value": "Violation of Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DataBreach", + "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels", "@type": [ + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1229,26 +1196,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N82834c9f1ecf4644ab2d9343a1169c62" - } - ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples/owl#E0069" - }, - { - "@id": "https://w3id.org/dpv/examples/owl#E0071" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1258,7 +1206,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach" + "@id": "https://w3id.org/dpv/owl#Likelihood" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1270,57 +1218,53 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Data Breach" + "@value": "Scale with 3 Likelihood Levels from High to Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Breach" + "@value": "3 Likelihood Levels" } ] }, { - "@id": "_:N82834c9f1ecf4644ab2d9343a1169c62", + "@id": "https://w3id.org/dpv/risk/owl#LoseTrust", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#hasRiskSource", - "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskSource" + "@id": "_:N95b0eaaa71714fb48e2d00a428e03220" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1332,31 +1276,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the risk (subject) has the indicated risk source (object)" + "@value": "Something that acts as or causes Loss of Trust" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has risk source" + "@value": "Lose of Trust" } + ] + }, + { + "@id": "_:N95b0eaaa71714fb48e2d00a428e03220", + "@type": [ + "https://schema.org/WebPage" ], - "https://schema.org/domainIncludes": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@value": "ISO/IEC 27005:2018" } ], - "https://schema.org/rangeIncludes": [ + "https://schema.org/url": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskSource" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L5", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L1", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1372,7 +1322,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.41,xsd:decimal" + "@value": "0.04,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1394,21 +1344,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:4 L:5)" + "@value": "Extremely Low Risk (RM7x7 S:2 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L3", + "@id": "https://w3id.org/dpv/risk/owl#IncidentMitigated", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1419,12 +1369,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.12,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1434,7 +1379,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1446,23 +1391,28 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low" + "@value": "The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:1 L:3)" + "@value": "Incident Mitigated" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#JudicialCosts", + "@id": "https://w3id.org/dpv/risk/owl#ThreatSource", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -1470,7 +1420,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1482,21 +1432,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that involves or causes judicial costs to be paid" + "@value": "Source of threat event, including both agent and non-agent sources" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Judicial Costs" + "@value": "Threat Source" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach", + "@id": "https://w3id.org/dpv/risk/owl#MonitorVulnerabilities", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1507,18 +1457,54 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Control that monitors a Risk Vulnerability" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Monitor Vulnerabilities" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ { - "@id": "_:Nee086e9da9f643e2837c115c27f1cabc" + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1528,7 +1514,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1540,37 +1526,51 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Security Breach" + "@value": "A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Security Breach" + "@value": "Risk Matrix 5x5" } ] }, { - "@id": "_:Nee086e9da9f643e2837c115c27f1cabc", + "@id": "https://w3id.org/dpv/risk/owl#IndividualHealthSafety", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Individual Health & Safety" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L6", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S2L3", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1586,7 +1586,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.24,xsd:decimal" + "@value": "0.67,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1596,7 +1596,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1608,20 +1608,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:2 L:6)" + "@value": "High Risk (RM3x3 S:2 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExtremelyLowRisk", + "@id": "https://w3id.org/dpv/risk/owl#RemoveSource", "@type": [ - "https://w3id.org/dpv/owl#RiskLevel", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -1633,12 +1633,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.01,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1648,7 +1643,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#SourceControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1660,27 +1655,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Extremely Low" + "@value": "Control that removes the risk source" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" + "@value": "Remove Source" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemModification", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L3", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1694,15 +1683,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N0c47798cd08a44d790a99ee3c58dcfb9" + "@value": "0.36,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1712,7 +1695,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1724,37 +1707,63 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised System Modification" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised System Modification" + "@value": "Moderate Risk (RM5x5 S:3 L:3)" } ] }, { - "@id": "_:N0c47798cd08a44d790a99ee3c58dcfb9", + "@id": "https://w3id.org/dpv/risk/owl#ContainmentControl", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/created": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "https://schema.org/url": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Control to contain event" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Containment Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Fraud", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L1", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1768,15 +1777,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nd4dde0f0f01e4d739b22630aa8ad7d7a" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1786,7 +1789,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1798,37 +1801,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Fraud" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Fraud" - } - ] - }, - { - "@id": "_:Nd4dde0f0f01e4d739b22630aa8ad7d7a", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Low Risk (RM5x5 S:4 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AuthorisationFailure", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L5", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1842,15 +1829,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N8906a1d2a7bd4484854e88a2dc1b93a5" + "@value": "0.71,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1860,7 +1841,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1872,37 +1853,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Authorisation Failure" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Authorisation Failure" + "@value": "Extremely High Risk (RM7x7 S:7 L:5)" } ] }, { - "@id": "_:N8906a1d2a7bd4484854e88a2dc1b93a5", + "@id": "https://w3id.org/dpv/risk/owl#ChangeImpact", "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISa Trust Services Security Incidents 2021" - } + "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" + "@value": "Harshvardhan J. Pandit" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IncidentHandlingReport", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { @@ -1917,7 +1888,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@id": "https://w3id.org/dpv/risk/owl#ImpactControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1929,18 +1900,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence" + "@value": "Control that changes Impact" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Handling Report" + "@value": "Change Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PhysicalAssault", + "@id": "https://w3id.org/dpv/risk/owl#HumanErrors", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -1965,7 +1936,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N4414613afa8c4456b9a9b6c3f17a7a0c" + "@id": "_:Na882c52257364f5896e5b38b50bb08fe" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1975,7 +1946,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1987,36 +1958,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Physical Assault" + "@value": "Something that acts as or causes Human Errors" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Physical Assault" + "@value": "Human Errors" } ] }, { - "@id": "_:N4414613afa8c4456b9a9b6c3f17a7a0c", + "@id": "_:Na882c52257364f5896e5b38b50bb08fe", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PsychologicalHarm", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L2", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -2031,15 +2002,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N903ec696d7504183af4ba63f3f295e8e" + "@value": "0.29,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2049,7 +2014,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2061,37 +2026,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Psychological Harm" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Psychological Harm" - } - ] - }, - { - "@id": "_:N903ec696d7504183af4ba63f3f295e8e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Moderate Risk (RM7x7 S:7 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccount", + "@id": "https://w3id.org/dpv/risk/owl#SystemMalfunction", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2113,7 +2062,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N2ad682e6dc844471903bc2f55f3eaae7" + "@id": "_:N18aeaa08367a4c56822793249e34feae" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2122,6 +2071,9 @@ } ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, { "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } @@ -2135,53 +2087,71 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes a compromised account that is then used by the compromiser" + "@value": "Something that acts as or causes System Malfunction" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account" + "@value": "System Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here system refers to both hardware and software systems" } ] }, { - "@id": "_:N2ad682e6dc844471903bc2f55f3eaae7", + "@id": "_:N18aeaa08367a4c56822793249e34feae", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L1", + "@id": "https://w3id.org/dpv/risk/owl#Incident", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" + }, + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.04,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples/owl#E0070" + }, + { + "@id": "https://w3id.org/dpv/examples/owl#E0069" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2191,7 +2161,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/owl#RiskConcept" + }, + { + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2203,38 +2176,43 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "An actual or occured event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:1 L:1)" + "@value": "Incident" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Incident is realised or materialised risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Payment", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L2", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2244,7 +2222,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2256,21 +2234,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Payment" + "@value": "Very Low Risk (RM5x5 S:1 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#HighLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#Blackmail", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Likelihood", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2281,12 +2259,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.75,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N72e00e4999f548eb88bf909311860524" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2296,13 +2280,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" }, { - "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2314,57 +2295,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is High" + "@value": "Something that acts as or causes Blackmail" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" + "@value": "Blackmail" } ] }, { - "@id": "https://w3id.org/dpv/primer", + "@id": "_:N72e00e4999f548eb88bf909311860524", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Primer for Data Privacy Vocabulary" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/primer" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "https://schema.org/url": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Damage", + "@id": "https://w3id.org/dpv/risk/owl#LowLikelihood", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -2376,13 +2336,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.25,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2392,7 +2351,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2404,20 +2369,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Damage" + "@value": "Level where Likelihood is Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Damage" + "@value": "Low Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L7", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAssessment", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -2429,12 +2400,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N812ddb57c74f4cbeb4d59d4bc7907be8" + "@value": "0.86,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2444,7 +2415,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2456,36 +2427,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other." + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix" - } - ] - }, - { - "@id": "_:N812ddb57c74f4cbeb4d59d4bc7907be8", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "IEC 31010:2019" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/72140.html" + "@value": "Extremely High Risk (RM7x7 S:6 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IdentityTheft", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L6", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -2500,15 +2455,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nad476399871e41a5bd37e1133df27770" + "@value": "0.86,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2518,7 +2467,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2530,37 +2479,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Identity Theft" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identity Theft" + "@value": "Extremely High Risk (RM7x7 S:7 L:6)" } ] }, { - "@id": "_:Nad476399871e41a5bd37e1133df27770", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L2", + "@id": "https://w3id.org/dpv/risk/owl#LowRisk", "@type": [ + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2571,12 +2504,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.40,xsd:decimal" + "@value": "0.25,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2586,7 +2519,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2598,45 +2537,29 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" + "@value": "Level where Risk is Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:5 L:2)" + "@value": "Low Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingCodeOfConduct", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingPolicy", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N3d2e8d97024142dca7a47b73cbb8097c" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -2650,46 +2573,24 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Code of Conduct" + "@value": "Something that acts as or causes violation of policy which can be either internal or external policy" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Code of Conduct" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N3d2e8d97024142dca7a47b73cbb8097c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Violating Policy" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingLegalObligation", + "@id": "https://w3id.org/dpv/risk/owl#LoseCustomerConfidence", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -2714,7 +2615,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Naf3bb0ebde894641a8c0a69545e7f6cc" + "@id": "_:N669b51dd9b0f4a71983f16dfc274956a" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2724,36 +2625,30 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Legal Obligations" + "@value": "Something that acts as or causes Loss of Customer Confidence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Legal Obligations" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0" + "@value": "Lose of Customer Confidence" } ] }, { - "@id": "_:Naf3bb0ebde894641a8c0a69545e7f6cc", + "@id": "_:N669b51dd9b0f4a71983f16dfc274956a", "@type": [ "https://schema.org/WebPage" ], @@ -2769,10 +2664,37 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExtremelyLowLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityBreach", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Likelihood", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#DataBreach" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#LowSeverity", + "@type": [ + "https://w3id.org/dpv/owl#Severity", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2788,7 +2710,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.01,xsd:decimal" + "@value": "0.25,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2798,7 +2720,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2810,27 +2738,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Extremely Low" + "@value": "Level where Severity is Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Likelihood" + "@value": "Low Severity" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" + "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L1", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L1", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2846,7 +2774,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.16,xsd:decimal" + "@value": "0.06,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2856,7 +2784,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2868,32 +2796,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:4 L:1)" + "@value": "Extremely Low Risk (RM7x7 S:3 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L3", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@language": "en", - "@value": "ISO 31073:2022 Risk management vocabulary" + "@value": "0.06,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2903,7 +2836,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskManagement" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2915,18 +2848,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Assessment of risk involving its identification, analysis, and evaluation" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Assessment" + "@value": "Extremely Low Risk (RM7x7 S:1 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L4", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L1", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2945,7 +2878,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.80,xsd:decimal" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2967,21 +2900,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:5 L:4)" + "@value": "Very Low Risk (RM5x5 S:3 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SexualViolence", + "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccountCredentials", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3003,7 +2936,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nbeddee22b7a841e39879764ab63949f8" + "@id": "_:N1005943ded74408ea68c811475686000" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3013,7 +2946,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3025,18 +2961,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Sexual Violence" + "@value": "Something that acts as or causes Account Credentials to be compromised" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sexual Violence" + "@value": "Compromise Account Credentials" } ] }, { - "@id": "_:Nbeddee22b7a841e39879764ab63949f8", + "@id": "_:N1005943ded74408ea68c811475686000", "@type": [ "https://schema.org/WebPage" ], @@ -3052,10 +2988,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L1", + "@id": "https://w3id.org/dpv/risk/owl#Sabotage", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3069,9 +3005,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.02,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N2fc72d8ce45943bcaad06c0a96aac629" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3081,7 +3023,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3093,82 +3041,53 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Something that acts as or causes Sabotage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:1 L:1)" + "@value": "Sabotage" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AccidentalMisuse", + "@id": "_:N2fc72d8ce45943bcaad06c0a96aac629", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "https://schema.org/WebPage" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "https://schema.org/url": [ { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L2", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2002/07/owl#Class" ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/contributor": [ { - "@language": "en", - "@value": "accepted" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Accidental Misuse" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Accidental Misuse" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#Spoofing", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N698cebdfba864777b23d25052c4d2493" - }, + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N603a4b8fadf24d23ac9c224927644c9d" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3178,10 +3097,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3193,84 +3109,68 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Spoofing" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Spoofing" - } - ] - }, - { - "@id": "_:N698cebdfba864777b23d25052c4d2493", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Moderate Risk (RM7x7 S:6 L:2)" } ] }, { - "@id": "_:N603a4b8fadf24d23ac9c224927644c9d", + "@id": "https://w3id.org/dpv/risk/owl#RemoveImpact", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + "@id": "https://w3id.org/dpv/risk/owl#ImpactControl" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "Risk Concepts - RDF/XML serialiation" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.rdf" + "@language": "en", + "@value": "Control that removes Impact i.e. prevents it from materialising" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@language": "en", + "@value": "Remove Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseCredibility", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L2", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3284,15 +3184,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N347037135ba54cefae0a2a69a47e52d9" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3302,7 +3196,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3314,34 +3208,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Credibility" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Credibility" - } - ] - }, - { - "@id": "_:N347037135ba54cefae0a2a69a47e52d9", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Extremely Low Risk (RM7x7 S:2 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DenialServiceAttack", + "@id": "https://w3id.org/dpv/risk/owl#Compensation", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -3349,13 +3227,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], "http://purl.org/dc/terms/modified": [ @@ -3364,14 +3242,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nf82ac345e0fe44a394f7da0ec78ef801" - }, - { - "@id": "_:N51a29309d655420e8611a50e7d2baa7c" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -3379,7 +3249,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3391,53 +3261,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Denial of Service Attack (DoS)" + "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Denial of Service Attack (DoS)" - } - ] - }, - { - "@id": "_:Nf82ac345e0fe44a394f7da0ec78ef801", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "_:N51a29309d655420e8611a50e7d2baa7c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Compensation" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L5", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L6", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3453,7 +3291,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.71,xsd:decimal" + "@value": "0.73,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3475,20 +3313,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:7 L:5)" + "@value": "Extremely High Risk (RM7x7 S:6 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeDisclosure", + "@id": "https://w3id.org/dpv/risk/owl#IncidentHalted", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -3500,18 +3338,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N540e39aa17014568ba5a2b03534c1f19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3521,7 +3348,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3533,34 +3360,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Disclosure" + "@value": "The incident has halted or paused with a high likelihood of resuming or recurring" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Disclosure" - } - ] - }, - { - "@id": "_:N540e39aa17014568ba5a2b03534c1f19", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "Incident Halted" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeModification", + "@id": "https://w3id.org/dpv/risk/owl#RightsLimitation", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -3568,13 +3379,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://purl.org/dc/terms/modified": [ @@ -3583,11 +3394,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N8ae12eb2b96a4c7e97a8739ee00ffe80" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -3595,7 +3401,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3607,37 +3413,85 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Modification" + "@value": "Something that acts as or causes Limitation of Rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Modification" + "@value": "Limitation of Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0" } ] }, { - "@id": "_:N8ae12eb2b96a4c7e97a8739ee00ffe80", + "@id": "https://w3id.org/dpv/risk/owl#ExtremelyHighLikelihood", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/owl#Likelihood", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.99,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Level where Likelihood is Extremely High" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Extremely High Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PersonalSafetyEndangerment", + "@id": "https://w3id.org/dpv/risk/owl#IdentityFraud", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3659,7 +3513,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Na66b6d002d3f448981a58870da1a686e" + "@id": "_:Nc74530c53d534886a66e5a7f741398bb" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3669,7 +3523,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3681,37 +3538,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Personal Safety Endangerment" + "@value": "Something that acts as or causes Identity Fraud" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Personal Safety Endangerment" + "@value": "Identity Fraud" } ] }, { - "@id": "_:Na66b6d002d3f448981a58870da1a686e", + "@id": "_:Nc74530c53d534886a66e5a7f741398bb", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L7", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataAccess", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3725,9 +3582,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.43,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N0eacc049940646a99623da2cd6a2d394" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3737,7 +3600,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3749,20 +3615,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High" + "@value": "Something that acts as or causes Unauthorised Data Access" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:3 L:7)" + "@value": "Unauthorised Data Access" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ChangeConsequence", + "@id": "_:N0eacc049940646a99623da2cd6a2d394", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#HighLikelihood", + "@type": [ + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -3774,7 +3656,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.75,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3784,7 +3671,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConsequenceControl" + "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3796,45 +3689,29 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that changes Consequence" + "@value": "Level where Likelihood is High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Change Consequence" + "@value": "High Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingContractualObligation", + "@id": "https://w3id.org/dpv/risk/owl#JudicialPenalty", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N1802c2900f5b4c578896c91c3149381d" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -3842,60 +3719,79 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Contractual Obligations" + "@value": "Something that involves or causes judicial penalties to be paid" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Contractual Obligation" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0" + "@value": "Judicial Penalty" } ] }, { - "@id": "_:N1802c2900f5b4c578896c91c3149381d", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-html", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://www.w3.org/TR/html/" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/format": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - HTML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.html" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/specification" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentDetectionReport", + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples/owl#E0069" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3905,7 +3801,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@id": "https://w3id.org/dpv/owl#Status" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3917,31 +3813,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the detection of a Incident" + "@value": "Status associated with an incident" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Detection Report" + "@value": "Incident Status" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#causedByVulnerability", + "@id": "https://w3id.org/dpv/risk/owl#ExtremelyHighSeverity", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" + "https://w3id.org/dpv/owl#Severity", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3949,6 +3851,11 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -3958,23 +3865,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the associated context (subject) is caused by the indicated vulnerability (object)" + "@value": "Level where Severity is Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "caused by vulnerability" + "@value": "Extremely High Severity" } ], - "https://schema.org/rangeIncludes": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L1", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S1L1", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -3993,7 +3901,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.14,xsd:decimal" + "@value": "0.11,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4003,7 +3911,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4015,45 +3923,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:7 L:1)" + "@value": "Low Risk (RM3x3 S:1 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataModification", + "@id": "https://w3id.org/dpv/risk/owl#IntegrityBreach", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Naa83e8f3fb5e4e9a88398292112d68f3" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -4061,7 +3947,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#DataBreach" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4069,57 +3958,18 @@ "@language": "en", "@value": "accepted" } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Modification" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Unauthorised Data Modification" - } - ] - }, - { - "@id": "_:Naa83e8f3fb5e4e9a88398292112d68f3", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" - } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VeryLowSeverity", + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityIncident", "@type": [ - "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.1,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4129,10 +3979,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4144,27 +3991,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Very Low" + "@value": "Incident where the confidentiality of information or system has been affected" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" + "@value": "Confidentiality Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L1", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L6", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4180,7 +4021,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.06,xsd:decimal" + "@value": "0.49,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4202,21 +4043,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:3 L:1)" + "@value": "Very High Risk (RM7x7 S:4 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PhysicalHarm", + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4226,7 +4067,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4235,35 +4076,29 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concepts associated with security threats that are likely to originate externally" + } + ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Physical Harm" + "@value": "External Security Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Reidentification", + "@id": "https://w3id.org/dpv/risk/owl#IncidentAssessmentReport", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4273,7 +4108,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4285,29 +4120,70 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Re-identification" + "@value": "A report describing the assessment of an incident in terms of its effects or impacts" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Re-identification" + "@value": "Incident Assessment Report" } + ] + }, + { + "@id": "https://w3id.org/dpv/examples", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@language": "en", - "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification" + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Examples for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/examples" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#InternalSecurityThreat", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L1", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.08,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -4315,7 +4191,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4327,21 +4203,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Concepts associated with security threats and issues that originate within the organisation" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Internal Security Threat" + "@value": "Extremely Low Risk (RM7x7 S:4 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IdentityFraud", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L4", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4355,15 +4231,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nbc1a7f7ae94c4fde84913e9622b759f6" + "@value": "0.32,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4373,7 +4243,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4385,34 +4255,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Identity Fraud" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identity Fraud" - } - ] - }, - { - "@id": "_:Nbc1a7f7ae94c4fde84913e9622b759f6", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "Moderate Risk (RM5x5 S:2 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseNegotiatingCapacity", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeDisclosure", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -4437,7 +4291,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd8a232e440f041b496b97da8007b588a" + "@id": "_:Nc4c391b305be479eb0e623d887a478ac" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4447,7 +4301,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4459,42 +4316,53 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Negotiating Capacity" + "@value": "Something that acts as or causes Unauthorised Code Disclosure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Negotiating Capacity" + "@value": "Unauthorised Code Disclosure" } ] }, { - "@id": "_:Nd8a232e440f041b496b97da8007b588a", + "@id": "_:Nc4c391b305be479eb0e623d887a478ac", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentMitigationMeasure", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S2L2", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.44,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4504,7 +4372,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskMitigationMeasure" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4516,21 +4384,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Mitigation Measure" + "@value": "Moderate Risk (RM3x3 S:2 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ModerateSeverity", + "@id": "https://w3id.org/dpv/risk/owl#DistributedDenialServiceAttack", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Severity", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4541,12 +4409,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.5,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N64ebcf10636d495599fc0fd262e44103" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4556,13 +4430,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" }, { - "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4574,86 +4445,53 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Moderate" + "@value": "Something that acts as or causes Distributed Denial of Service Attack (DDoS)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" + "@value": "Distributed Denial of Service Attack (DDoS)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk", + "@id": "_:N64ebcf10636d495599fc0fd262e44103", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/owl#RiskConcept" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "Risks and issues that arise during operational processes" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Operational Security Risk" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Fee", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L5", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@language": "en", - "@value": "DGA 2.10" + "@value": "0.10,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4663,35 +4501,46 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides fees e.g. for using a service" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Fee" + "@value": "Very Low Risk (RM7x7 S:1 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat", + "@id": "https://w3id.org/dpv/risk/owl#MonitorConsequence", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -4699,7 +4548,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4711,32 +4560,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Concepts associated with security threats that are likely to originate externally" + "@value": "Control that monitors a Risk Consequence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "External Security Threat" + "@value": "Monitor Consequence" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RightsExercisePrevention", + "@id": "https://w3id.org/dpv/risk/owl#SexualViolence", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -4745,6 +4594,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Ncb4b4f28b9894b79bfd2a5d2dd41f88f" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -4752,7 +4606,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4764,33 +4618,47 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Prevent Exercising of Rights" + "@value": "Something that acts as or causes Sexual Violence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Prevent Exercising of Rights" + "@value": "Sexual Violence" + } + ] + }, + { + "@id": "_:Ncb4b4f28b9894b79bfd2a5d2dd41f88f", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ReductionControl", + "@id": "https://w3id.org/dpv/risk/owl#causedByThreat", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskControl", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" + ], + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Threat" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4798,11 +4666,6 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -4812,20 +4675,25 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that reduces the likelihood or severity of an event" + "@value": "Indicates the cause of associated context (subject) was the indicated threat (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reduction Control" + "@value": "caused by threat" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseOpportunity", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L4", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -4840,15 +4708,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N0e6dade5a2814d0f815e1c5dd41f1c65" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4858,7 +4720,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4870,37 +4732,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Opportunity" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Opportunity" - } - ] - }, - { - "@id": "_:N0e6dade5a2814d0f815e1c5dd41f1c65", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Low Risk (RM5x5 S:1 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L1", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4914,6 +4760,11 @@ "@value": "2022-08-17" } ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.02,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -4921,7 +4772,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4933,37 +4784,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix 5x5" + "@value": "Extremely Low Risk (RM7x7 S:1 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S3L3", + "@id": "https://w3id.org/dpv/risk/owl#AccidentalIncident", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.99,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4973,7 +4813,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4985,21 +4825,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High" + "@value": "Incident caused due to accidental actions arising from human or human-controlled situations" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM3x3 S:3 L:3)" + "@value": "Accidental Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentNearMiss", + "@id": "https://w3id.org/dpv/risk/owl#IncidentOngoing", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#IncidentStatus", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5032,37 +4872,48 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The state where an incident was almost successful in taking place i.e. \"it came very close\"" + "@value": "The incident is ongoing i.e. still active" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Near Miss" + "@value": "Incident Ongoing" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ContainmentControl", + "@id": "https://w3id.org/dpv/risk/owl#Discrimination", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-19" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" } ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5074,51 +4925,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to contain event" + "@value": "Something that acts as or causes Discrimination" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Containment Control" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/json-ld11/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/application/ld+json" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - JSON-LD serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk-owl.jsonld" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@value": "Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels", + "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels", "@type": [ - "https://w3id.org/dpv/owl#Severity", + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -5140,7 +4960,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Severity" + "@id": "https://w3id.org/dpv/owl#Likelihood" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5152,19 +4972,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 5 Severity Levels from Very High to Very Low" + "@value": "Scale with 5 Likelihood Levels from Very High to Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "5 Severity Levels" + "@value": "5 Likelihood Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentRegister", + "@id": "https://w3id.org/dpv/risk/owl#ReduceLikelihood", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -5186,7 +5007,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RecordsOfActivities" + "@id": "https://w3id.org/dpv/risk/owl#ReductionControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5198,21 +5019,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A register recording incidentes, their reports, notifications, and other related activities" + "@value": "Control that reduces the likelihood of an event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Register" + "@value": "Reduce Likelihood" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ShareRisk", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S3L1", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5223,7 +5044,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.33,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5233,7 +5059,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5245,21 +5071,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that shares Risk e.g. amongst stakeholders" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Share Risk" + "@value": "Moderate Risk (RM3x3 S:3 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L2", + "@id": "https://w3id.org/dpv/risk/owl#IncidentSuspected", "@type": [ + "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5270,12 +5096,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.20,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5285,7 +5106,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5297,21 +5118,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" + "@value": "The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:5 L:2)" + "@value": "Incident Suspected" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L4", + "@id": "https://w3id.org/dpv/risk/owl#LoseReputation", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5325,9 +5146,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.16,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N90d89ca8a8594ecabee31205aee25395" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5337,7 +5164,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5349,67 +5176,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" + "@value": "Something that acts as or causes Loss of Reputation" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:1 L:4)" + "@value": "Lose of Reputation" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#isVulnerabilityOf", + "@id": "_:N90d89ca8a8594ecabee31205aee25395", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" - ], - "http://purl.org/dc/dcam/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Indicates the vulnerability (subject) is associated with indicated context (object)" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "is vulnerability of" + "@value": "ISO/IEC 27005:2018" } ], - "https://schema.org/domainIncludes": [ + "https://schema.org/url": [ { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VeryLowLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L6", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5420,12 +5217,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.1,xsd:decimal" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5435,10 +5232,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5450,24 +5244,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" + "@value": "Very Low Risk (RM7x7 S:1 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L3", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S1L2", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -5486,7 +5274,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.24,xsd:decimal" + "@value": "0.22,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5496,7 +5284,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5508,20 +5296,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:2 L:3)" + "@value": "Low Risk (RM3x3 S:1 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Injury", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L3", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -5536,15 +5324,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N1ef56bb9fadb431ba4c270603c7acdec" + "@value": "0.18,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5554,7 +5336,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5566,53 +5348,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Injury" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Injury" - } - ] - }, - { - "@id": "_:N1ef56bb9fadb431ba4c270603c7acdec", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Low Risk (RM7x7 S:3 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L4", + "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-02-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.33,xsd:decimal" + "@language": "en", + "@value": "ISO 31073:2022 Risk management vocabulary" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5622,7 +5383,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskManagement" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5634,36 +5395,46 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High" + "@value": "Assessment of risk involving its identification, analysis, and evaluation" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:4 L:4)" + "@value": "Risk Assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentConcludingReport", + "@id": "https://w3id.org/dpv/risk/owl#refersToRisk", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@id": "https://w3id.org/dpv/owl#Incident" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://w3id.org/dpv/owl#Risk" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples/owl#E0069" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5675,21 +5446,31 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known" + "@value": "Indicates the incident (subject) is a materialisation of the indicated risk (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Concluding Report" + "@value": "refers to risk" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/owl#Incident" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/owl#Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LowRisk", + "@id": "https://w3id.org/dpv/risk/owl#ModerateRisk", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskLevel", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5705,7 +5486,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.25,xsd:decimal" + "@value": "0.5,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5715,13 +5496,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" }, { "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" }, { - "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5733,26 +5514,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Low" + "@value": "Level where Risk is Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk" + "@value": "Moderate Risk" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" + "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentConcluded", + "@id": "https://w3id.org/dpv/risk/owl#ModerateLikelihood", "@type": [ - "https://w3id.org/dpv/risk/owl#IncidentStatus", + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -5764,7 +5545,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.5,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5774,7 +5560,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5786,26 +5578,43 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring" + "@value": "Level where Likelihood is Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Concluded" + "@value": "Moderate Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentOngoingReport", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L1", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5815,7 +5624,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5827,21 +5636,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Ongoing Report" + "@value": "Very Low Risk (RM5x5 S:2 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L1", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L2", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5857,7 +5666,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.10,xsd:decimal" + "@value": "0.04,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5879,23 +5688,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:5 L:1)" + "@value": "Extremely Low Risk (RM7x7 S:1 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IntentionalMisuse", + "@id": "https://w3id.org/dpv/risk/owl#ImpactControl", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -5903,7 +5723,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5915,39 +5735,68 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Intentional Misuse" + "@value": "Risk Mitigation Measure that controls Impacts" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Intentional Misuse" + "@value": "Impact Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S2L3", + "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "0.67,xsd:decimal" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes an attack on security with the aim of undermining it" } ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Security Attack" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -5955,7 +5804,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5967,37 +5816,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + "@value": "Risks and issues that affect the reputation of the organisation" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM3x3 S:2 L:3)" + "@value": "Reputational Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L3", + "@id": "https://w3id.org/dpv/risk/owl#SocialDisadvantage", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.12,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6007,7 +5857,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6019,52 +5869,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" + "@value": "Something that acts as or causes Social Disadvantage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:2 L:3)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/turtle/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/turtle" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - Turtle serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk-owl.ttl" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@value": "Social Disadvantage" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L4", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataDisclosure", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6078,9 +5897,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.49,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N7c66233cabb64c2486ae612a1ff6b01d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6090,7 +5915,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6102,63 +5930,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High" + "@value": "Something that acts as or causes Unauthorised Data Disclosure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:6 L:4)" + "@value": "Unauthorised Data Disclosure" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IdentificationControl", + "@id": "_:N7c66233cabb64c2486ae612a1ff6b01d", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskControl", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "Control to identify characteristics of event" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Identification Control" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#HighRisk", + "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskLevel", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6169,12 +5971,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.75,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nb3034bc7cf1e485b85582c21529ebaa4" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6184,13 +5992,16 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" }, { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" }, { - "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6202,69 +6013,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is High" + "@value": "Something that acts as or causes Security Breach" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" + "@value": "Security Breach" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ComponentMalfunction", + "@id": "_:Nb3034bc7cf1e485b85582c21529ebaa4", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Component Malfunction" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "Component Malfunction" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ModerateLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#ShareRisk", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Likelihood", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6275,12 +6054,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.5,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6290,13 +6064,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6308,37 +6076,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Moderate" + "@value": "Risk Mitigation Measure that shares Risk e.g. amongst stakeholders" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" + "@value": "Share Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Privacy", + "@id": "https://w3id.org/dpv/risk/owl#hasVulnerability", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6347,15 +6114,26 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Indicates the associated context (subject) has indicated vulnerability (object)" + } + ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Privacy" + "@value": "has vulnerability" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Coercion", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingCodeOfConduct", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -6380,7 +6158,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N61513676426149faae9e58063eb667d8" + "@id": "_:Nb240be91051241df8fe71581eedea8cc" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6390,49 +6168,55 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Coercion" + "@value": "Something that acts as or causes Violation of Code of Conduct" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Coercion" + "@value": "Violating Code of Conduct" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0" } ] }, { - "@id": "_:N61513676426149faae9e58063eb667d8", + "@id": "_:Nb240be91051241df8fe71581eedea8cc", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SystemIntrusion", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L5", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6446,15 +6230,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N7a5848cbabb14c8ea2d162432eba32f0" + "@value": "0.41,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6464,7 +6242,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6476,48 +6254,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Intrusion" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Intrusion" - } - ] - }, - { - "@id": "_:N7a5848cbabb14c8ea2d162432eba32f0", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "High Risk (RM7x7 S:4 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentMitigated", + "@id": "https://w3id.org/dpv/risk/owl#IncidentHandlingReport", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6527,7 +6283,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6539,26 +6295,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring" + "@value": "A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Mitigated" + "@value": "Incident Handling Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Threat", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L4", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6568,7 +6335,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskSource" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6580,39 +6347,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk source event which causes Risk" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Threat" + "@value": "Low Risk (RM7x7 S:2 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L2", + "@id": "https://w3id.org/dpv/risk/owl#AccidentalMisuse", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.29,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -6620,7 +6371,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6632,21 +6383,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate" + "@value": "Accidental Misuse" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:7 L:2)" + "@value": "Accidental Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Cryptojacking", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L4", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6660,15 +6411,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Neb960f38438d48258bee0ebae96be48e" + "@value": "0.33,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6678,7 +6423,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6690,37 +6435,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Cryptojacking" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cryptojacking" - } - ] - }, - { - "@id": "_:Neb960f38438d48258bee0ebae96be48e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Landscape 2021" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" + "@value": "High Risk (RM7x7 S:4 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L2", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L2", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6736,7 +6465,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.32,xsd:decimal" + "@value": "0.40,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6758,21 +6487,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:4 L:2)" + "@value": "High Risk (RM5x5 S:5 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Scam", + "@id": "https://w3id.org/dpv/risk/owl#EquipmentFailure", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6794,7 +6523,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N498890541a5449e290f0aea406ea5090" + "@id": "_:N8e86fbf714a04b25a51dfcacec1cb10e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6804,7 +6533,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6816,18 +6548,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Scam" + "@value": "Something that acts as or causes Equipment Failure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Scam" + "@value": "Equipment Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here equipment refers to physical equipment" } ] }, { - "@id": "_:N498890541a5449e290f0aea406ea5090", + "@id": "_:N8e86fbf714a04b25a51dfcacec1cb10e", "@type": [ "https://schema.org/WebPage" ], @@ -6843,10 +6581,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Extorsion", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L6", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6860,15 +6598,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N40f94dff19814aa6ae7d3074eb3409d8" + "@value": "0.37,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6878,7 +6610,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6890,48 +6622,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Extorsion" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extorsion" - } - ] - }, - { - "@id": "_:N40f94dff19814aa6ae7d3074eb3409d8", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "High Risk (RM7x7 S:3 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorImpact", + "@id": "https://w3id.org/dpv/risk/owl#RightsExercisePrevention", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6941,7 +6663,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6953,23 +6675,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Impact" + "@value": "Something that acts as or causes Prevent Exercising of Rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Impact" + "@value": "Prevent Exercising of Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks", + "@id": "https://w3id.org/dpv/risk/owl#IncidentDetectionReport", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -6977,7 +6710,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6989,21 +6722,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Concepts associated with risks that arise due to User or Human use" + "@value": "A report describing the detection of a Incident" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "User Risks" + "@value": "Incident Detection Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L3", + "@id": "https://w3id.org/dpv/risk/owl#Spoofing", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -7017,9 +6750,18 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.18,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N0085b3ac0b474cf1a64eccdff3718c8d" + }, + { + "@id": "_:N539160303302464aa341bdfa53068f22" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7029,7 +6771,16 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7041,32 +6792,69 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + "@value": "Something that acts as or causes Spoofing" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:3 L:3)" + "@value": "Spoofing" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskSource", + "@id": "_:N0085b3ac0b474cf1a64eccdff3718c8d", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "_:N539160303302464aa341bdfa53068f22", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L2", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.32,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7076,7 +6864,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7088,259 +6876,106 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Source" + "@value": "Moderate Risk (RM5x5 S:4 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#", + "@id": "https://w3id.org/dpv/risk/owl#InterceptCommunications", "@type": [ - "http://www.w3.org/ns/dx/prof/Profile", - "http://www.w3.org/2002/07/owl#Ontology" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/bibliographicCitation": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@value": "http://www.w3.org/2004/02/skos/core" - }, + "http://purl.org/dc/terms/created": [ { - "@id": "http://www.w3.org/2002/07/owl" - }, - { - "@value": "http://www.w3.org/2000/01/rdf-schema" - } - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Axel Polleres" - }, - { - "@value": "Rob Brennan" - }, - { - "@value": "Julian Flake" - }, - { - "@value": "Fajar Ekaputra" - }, - { - "@value": "Beatriz Esteves" - }, - { - "@value": "Julio Fernandez" - }, - { - "@value": "Delaram Golpayegani" - }, - { - "@value": "Georg P. Krog" - }, - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@language": "en", - "@value": "2022-08-14" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/creator": [ - { - "@language": "en", - "@value": "Delaram Golpayegani" - }, - { - "@language": "en", - "@value": "Beatriz Esteves" - }, - { - "@language": "en", - "@value": "Julian Flake" - }, - { - "@language": "en", - "@value": "Rob Brennan" - }, - { - "@language": "en", - "@value": "Harshvardhan J. Pandit" - }, - { - "@language": "en", - "@value": "Paul Ryan" - }, + "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "Georg P. Krog" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/description": [ + "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" + "@id": "_:N1f36b972c50f49fb9b474152b57cf474" } ], - "http://purl.org/dc/terms/hasVersion": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/identifier": [ - { - "@value": "https://w3id.org/dpv/risk" - } - ], - "http://purl.org/dc/terms/issued": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@language": "en", - "@value": "2022-08-14" - } - ], - "http://purl.org/dc/terms/license": [ + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, { - "@id": "https://www.w3.org/copyright/document-license-2023/" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "2024-07-13" - } - ], - "http://purl.org/dc/terms/publisher": [ - { - "@id": "https://www.w3.org/" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "https://www.w3.org/groups/cg/dpvcg/" + "@value": "modified" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Concepts" - } - ], - "http://purl.org/ontology/bibo/doi": [ - { - "@value": "10.5281/zenodo.12505841" - } - ], - "http://purl.org/ontology/bibo/status": [ - { - "@value": "http://purl.org/ontology/bibo/status/published" - } - ], - "http://purl.org/vocab/vann/preferredNamespacePrefix": [ - { - "@value": "risk" - } - ], - "http://purl.org/vocab/vann/preferredNamespaceUri": [ - { - "@value": "https://w3id.org/dpv/risk#" + "@value": "Something that acts as or causes Interception of Communications" } ], - "http://www.w3.org/2000/01/rdf-schema#Label": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "RISK" - } - ], - "http://www.w3.org/2002/07/owl#versionIRI": [ - { - "@id": "https://w3id.org/dpv/2.1-dev/risk/owl#" - } - ], - "http://www.w3.org/2002/07/owl#versionInfo": [ - { - "@value": "2.1-dev" - } - ], - "http://www.w3.org/ns/dx/prof/hasResource": [ - { - "@id": "https://w3id.org/dpv/guides" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-html" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3" - }, - { - "@id": "https://w3id.org/dpv/examples" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf" - }, - { - "@id": "https://w3id.org/dpv/primer" + "@value": "Intercept Communications" } ], - "http://www.w3.org/ns/dx/prof/isProfileOf": [ - { - "@id": "http://www.w3.org/2002/07/owl" - }, - { - "@id": "https://w3id.org/dpv/owl" - }, + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@language": "en", + "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0" } + ] + }, + { + "@id": "_:N1f36b972c50f49fb9b474152b57cf474", + "@type": [ + "https://schema.org/WebPage" ], - "http://xmlns.com/foaf/0.1/logo": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/media/logo.png" + "@value": "ISO/IEC 27005:2018" } ], - "https://schema.org/version": [ + "https://schema.org/url": [ { - "@value": "2.1-dev" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LowSeverity", + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Severity", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.25,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -7348,13 +6983,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7366,24 +6995,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Low" + "@value": "Risks and issues that have their basis in legal requirements and enforcement" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" + "@value": "Legal Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VulnerabilityCreated", + "@id": "https://w3id.org/dpv/risk/owl#Fraud", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -7408,7 +7031,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nc0018c079b6b42619d869b3ae63ec70a" + "@id": "_:N0328e4baf7504ceb93cd9bbab8b23099" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7418,7 +7041,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#InternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7430,18 +7056,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Vulnerability Created" + "@value": "Something that acts as or causes Fraud" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Vulnerability Created" + "@value": "Fraud" } ] }, { - "@id": "_:Nc0018c079b6b42619d869b3ae63ec70a", + "@id": "_:N0328e4baf7504ceb93cd9bbab8b23099", "@type": [ "https://schema.org/WebPage" ], @@ -7457,58 +7083,58 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-html", + "@id": "https://w3id.org/dpv/risk/owl#MonitorImpact", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/title": [ + "http://purl.org/dc/terms/created": [ { - "@value": "Risk Concepts - HTML serialiation" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.html" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/specification" + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L1", - "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "Harshvardhan J. Pandit" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@language": "en", + "@value": "Control that monitors a Risk Impact" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "0.20,xsd:decimal" + "@language": "en", + "@value": "Monitor Impact" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Privacy", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -7517,7 +7143,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7526,29 +7152,34 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low" - } - ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:5 L:1)" + "@value": "Privacy" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentSuspectedReport", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L7", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.57,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7558,7 +7189,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7570,21 +7201,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the suspicion of an incident in the past or occuring" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Suspected Report" + "@value": "Very High Risk (RM7x7 S:4 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VeryLowRisk", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L1", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -7595,12 +7226,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.1,xsd:decimal" + "@value": "0.14,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7610,10 +7241,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7625,38 +7253,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" + "@value": "Low Risk (RM7x7 S:7 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels", + "@id": "https://w3id.org/dpv/risk/owl#IncidentPreliminaryReport", "@type": [ - "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7666,7 +7282,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskLevel" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7678,37 +7294,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 5 Risk Levels from Very High to Very Low" + "@value": "A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "5 Risk Levels" + "@value": "Incident Preliminary Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L4", + "@id": "https://w3id.org/dpv/risk/owl#RemedyControl", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.57,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7718,7 +7324,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7730,21 +7336,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High" + "@value": "Control to remedy consequences of event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:7 L:4)" + "@value": "Remedy Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingEthicsCode", + "@id": "https://w3id.org/dpv/risk/owl#ViolenceAgainstChildren", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -7766,7 +7372,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd8ddc1f8024a4418b62c344837cff0cd" + "@id": "_:N50def33314ee4442bf7e77161e51165b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7776,55 +7382,55 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Ethics Code" + "@value": "Something that acts as or causes Child Violence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Ethics Code" + "@value": "Violence against children" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0" + "@value": "This concept was called \"ChildViolence\" in DPV 2.0" } ] }, { - "@id": "_:Nd8ddc1f8024a4418b62c344837cff0cd", + "@id": "_:N50def33314ee4442bf7e77161e51165b", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L5", + "@id": "https://w3id.org/dpv/risk/owl#VeryLowSeverity", "@type": [ + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -7835,12 +7441,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.10,xsd:decimal" + "@value": "0.1,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7850,7 +7456,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7862,21 +7471,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low" + "@value": "Level where Severity is Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:1 L:5)" + "@value": "Very Low Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L5", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -7887,7 +7502,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.51,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7897,7 +7517,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7909,26 +7529,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that uses controls to monitor events" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Control" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised." + "@value": "Very High Risk (RM7x7 S:5 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -7942,11 +7557,6 @@ "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N837e146fba804365b9e619c05849f3d1" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -7954,7 +7564,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment" + "@id": "https://w3id.org/dpv/owl#RiskLevel" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7965,38 +7575,22 @@ ], "http://www.w3.org/2004/02/skos/core#definition": [ { - "@language": "en", - "@value": "A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Risk Analysis" - } - ] - }, - { - "@id": "_:N837e146fba804365b9e619c05849f3d1", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "IEC 31010:2019" + "@language": "en", + "@value": "Scale with 5 Risk Levels from Very High to Very Low" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "https://www.iso.org/standard/72140.html" + "@language": "en", + "@value": "5 Risk Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L3", + "@id": "https://w3id.org/dpv/risk/owl#ErroneousSystemUse", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -8010,9 +7604,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.60,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N258e312c37aa4354bed73603ef7a36f6" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8022,7 +7622,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8034,26 +7634,54 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High" + "@value": "Something that acts as or causes Erroneous System Use" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:5 L:3)" + "@value": "Erroneous System Use" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityIncident", + "@id": "_:N258e312c37aa4354bed73603ef7a36f6", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedReidentification", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-19" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8063,7 +7691,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8075,18 +7706,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident where the integrity of information or system has been affected" + "@value": "Something that acts as or causes Unauthorised Re-Identification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Integrity Incident" + "@value": "Unauthorised Re-Identification" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Reward", + "@id": "https://w3id.org/dpv/risk/owl#SystemFailure", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -8094,13 +7725,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -8109,6 +7740,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nd794c9a0064e4fe6bb3a0ebd38859b9b" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -8116,7 +7752,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8128,39 +7767,44 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee" + "@value": "Something that acts as or causes System Failure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reward" + "@value": "System Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here system refers to both hardware and software systems" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Benefit", + "@id": "_:Nd794c9a0064e4fe6bb3a0ebd38859b9b", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" - } + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/name": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" + "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" } ], - "http://purl.org/dc/terms/modified": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -8169,7 +7813,16 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8181,32 +7834,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes benefits" + "@value": "Something that acts as or causes Unauthorised Activity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Benefit" + "@value": "Unauthorised Activity" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentSuspected", + "@id": "https://w3id.org/dpv/risk/owl#Payment", "@type": [ - "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-04-14" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8216,7 +7875,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8228,21 +7887,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing" + "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Suspected" + "@value": "Payment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ModerateRisk", + "@id": "https://w3id.org/dpv/risk/owl#MaliciousCodeAttack", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskLevel", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -8253,12 +7912,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.5,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N625dc3c061c74eec9f96d171c60fd3c0" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8268,13 +7933,16 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" }, { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" }, { - "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8286,25 +7954,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Moderate" + "@value": "Something that acts as or causes Malicious Code Attack" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk" + "@value": "Malicious Code Attack" + } + ] + }, + { + "@id": "_:N625dc3c061c74eec9f96d171c60fd3c0", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentImpactAssessment", + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels", "@type": [ + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -8316,7 +7995,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8326,7 +8005,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#ImpactAssessment" + "@id": "https://w3id.org/dpv/owl#Severity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8338,21 +8017,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "An impact assessment associated with a incident" + "@value": "Scale with 7 Severity Levels from Extremely High to Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Impact Assessment" + "@value": "7 Severity Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MaterialDamage", + "@id": "https://w3id.org/dpv/risk/owl#VeryHighSeverity", "@type": [ + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -8363,13 +8042,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.9,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8379,7 +8057,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8391,27 +8072,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Material Damage" + "@value": "Level where Severity is Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Material Damage" + "@value": "Very High Severity" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" + "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#FinancialLoss", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L2", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -8425,15 +8106,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N0296c48d481641d492572a05652b6bf5" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8443,7 +8118,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8455,54 +8130,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Financial Loss" - } - ] - }, - { - "@id": "_:N0296c48d481641d492572a05652b6bf5", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "Low Risk (RM7x7 S:4 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Discrimination", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L2", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8512,7 +8170,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8524,23 +8182,39 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Discrimination" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Discrimination" + "@value": "Moderate Risk (RM5x5 S:3 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L5", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.80,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -8548,7 +8222,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8560,21 +8234,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that affect the reputation of the organisation" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reputational Risk" + "@value": "Very High Risk (RM5x5 S:4 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L4", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L7", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -8590,7 +8264,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.64,xsd:decimal" + "@value": "0.43,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8600,7 +8274,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8612,20 +8286,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:4 L:4)" + "@value": "Very High Risk (RM7x7 S:3 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L5", "@type": [ - "https://w3id.org/dpv/owl#Likelihood", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -8637,7 +8311,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8647,7 +8326,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Likelihood" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8659,18 +8338,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 7 Likelihood Levels from Extremely High to Extremely Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "7 Likelihood Levels" + "@value": "Low Risk (RM5x5 S:1 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RightsViolation", + "@id": "https://w3id.org/dpv/risk/owl#UnwantedDataDeletion", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -8678,13 +8357,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -8693,6 +8372,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nde382e9a51c445d69476b298827b1cbe" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -8700,7 +8384,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8712,29 +8402,55 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Rights" + "@value": "Something that acts as or causes Unwanted Data Deletion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Rights" + "@value": "Unwanted Data Deletion" } + ] + }, + { + "@id": "_:Nde382e9a51c445d69476b298827b1cbe", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0" + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L5", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.99,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -8742,7 +8458,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8754,21 +8470,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that have their basis in legal requirements and enforcement" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Legal Risk" + "@value": "Very High Risk (RM5x5 S:5 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L2", + "@id": "https://w3id.org/dpv/risk/owl#LoseCredibility", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -8782,9 +8498,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.16,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N2c068c379d9b4c2b8da0937ad8be6a81" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8794,7 +8516,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8806,20 +8528,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + "@value": "Something that acts as or causes Loss of Credibility" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:2 L:2)" + "@value": "Lose of Credibility" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L5", + "@id": "_:N2c068c379d9b4c2b8da0937ad8be6a81", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels", + "@type": [ + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -8831,12 +8569,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.20,xsd:decimal" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8846,7 +8579,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/owl#Severity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8858,18 +8591,48 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low" + "@value": "Scale with 5 Severity Levels from Very High to Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:1 L:5)" + "@value": "5 Severity Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L6", + "@id": "https://w3id.org/dpv/risk/owl#PhysicalHarm", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Physical Harm" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L2", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -8910,31 +8673,43 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:1 L:6)" + "@value": "Very Low Risk (RM7x7 S:3 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#hasIncident", + "@id": "https://w3id.org/dpv/risk/owl#PhishingScam", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nb657a11b610f419a86eb9ea4a94e7e37" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8942,6 +8717,14 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -8951,23 +8734,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates an incident is associated with the specified context" + "@value": "Something that acts as or causes Phishing Scam" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has incident" + "@value": "Phishing Scam" } + ] + }, + { + "@id": "_:Nb657a11b610f419a86eb9ea4a94e7e37", + "@type": [ + "https://schema.org/WebPage" ], - "https://schema.org/rangeIncludes": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DistributedDenialServiceAttack", + "@id": "https://w3id.org/dpv/risk/owl#Coercion", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -8992,7 +8786,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N842f6dd3b92c482180f56ce6a495c382" + "@id": "_:Nc78302d156fb497aae9594fa63bb9fa7" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9001,6 +8795,9 @@ } ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, { "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } @@ -9014,37 +8811,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Distributed Denial of Service Attack (DDoS)" + "@value": "Something that acts as or causes Coercion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Distributed Denial of Service Attack (DDoS)" + "@value": "Coercion" } ] }, { - "@id": "_:N842f6dd3b92c482180f56ce6a495c382", + "@id": "_:Nc78302d156fb497aae9594fa63bb9fa7", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L5", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L6", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9060,7 +8857,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.60,xsd:decimal" + "@value": "0.61,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9070,7 +8867,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9082,39 +8879,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:3 L:5)" + "@value": "Extremely High Risk (RM7x7 S:5 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L2", + "@id": "https://w3id.org/dpv/risk/owl#EnvironmentalRisk", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.04,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -9122,7 +8903,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9134,37 +8915,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low" + "@value": "Risks and issues that have their origin in environment or can affect the environment at large" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:1 L:2)" + "@value": "Environmental Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L3", + "@id": "https://w3id.org/dpv/risk/owl#ReductionControl", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.37,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9174,7 +8945,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9186,37 +8957,31 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" + "@value": "Control that reduces the likelihood or severity of an event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:6 L:3)" + "@value": "Reduction Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L6", + "@id": "https://w3id.org/dpv/risk/owl#RiskControl", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/vocab/vann/example": [ { - "@value": "0.37,xsd:decimal" + "@id": "https://w3id.org/dpv/examples/owl#E0071" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9226,7 +8991,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/owl#RiskMitigationMeasure" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9238,27 +9003,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" + "@value": "Control that modifies risk" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:3 L:6)" + "@value": "Risk Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#causedByThreat", + "@id": "https://w3id.org/dpv/risk/owl#exploitsVulnerability", "@type": [ "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/dcam/domainIncludes": [ { "@id": "https://w3id.org/dpv/risk/owl#Threat" } ], + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", @@ -9279,26 +9049,31 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the cause of associated context (subject) was the indicated threat (object)" + "@value": "Indicates the threat (subject) exploits the indicated vulnerability (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "caused by threat" + "@value": "exploits vulnerability" } ], - "https://schema.org/rangeIncludes": [ + "https://schema.org/domainIncludes": [ { "@id": "https://w3id.org/dpv/risk/owl#Threat" } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LowLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L5", "@type": [ - "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9309,12 +9084,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.25,xsd:decimal" + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9324,13 +9099,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9342,37 +9111,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" + "@value": "Low Risk (RM7x7 S:2 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#hasVulnerability", + "@id": "https://w3id.org/dpv/risk/owl#Damage", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-03-30" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9380,6 +9150,11 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -9389,26 +9164,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the associated context (subject) has indicated vulnerability (object)" + "@value": "Something that acts as or causes Damage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has vulnerability" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@value": "Damage" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedResourceUse", + "@id": "https://w3id.org/dpv/risk/owl#DataCorruption", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9428,9 +9198,75 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N8aaec0d1fefb4744abcf3099509b1988" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "modified" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Corruption of Data" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Data Corruption" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"Corruption Data\" in DPV 2.0" + } + ] + }, + { + "@id": "_:N8aaec0d1fefb4744abcf3099509b1988", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#CrossBorderIncident", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ { - "@id": "_:Nd4175f97fd33423f9014c3d690d56fad" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9440,7 +9276,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9452,42 +9288,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Resource Use" + "@value": "Incident involving cross-border or multiple jurisdictions" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Resource Use" + "@value": "Cross-Border Incident" } ] }, { - "@id": "_:Nd4175f97fd33423f9014c3d690d56fad", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L3", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ThreatSource", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "0.60,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9497,7 +9328,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9509,18 +9340,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Source of threat event, including both agent and non-agent sources" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Threat Source" + "@value": "High Risk (RM5x5 S:5 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PhishingScam", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingContractualObligation", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -9545,7 +9376,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N2039355de6a7474a8ab35355297e33c6" + "@id": "_:N638499f1a35f4f94abab8a1e6e4bf97d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9555,64 +9386,60 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Phishing Scam" + "@value": "Something that acts as or causes Violation of Contractual Obligations" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Phishing Scam" + "@value": "Violation of Contractual Obligation" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0" } ] }, { - "@id": "_:N2039355de6a7474a8ab35355297e33c6", + "@id": "_:N638499f1a35f4f94abab8a1e6e4bf97d", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#isExploitedBy", + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityIncident", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" - ], - "http://purl.org/dc/dcam/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" - } - ], - "http://purl.org/dc/dcam/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Threat" - } + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9620,6 +9447,11 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Incident" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -9629,36 +9461,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the vulnerability (subject) is exploited by the indicated threat (object)" + "@value": "Incident where the availability of information or system has been affected" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "is exploited by" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Threat" + "@value": "Availability Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CrossBorderIncident", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L3", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9668,7 +9501,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9680,21 +9513,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident involving cross-border or multiple jurisdictions" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cross-Border Incident" + "@value": "Very Low Risk (RM5x5 S:1 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels", + "@id": "https://w3id.org/dpv/risk/owl#Harm", "@type": [ - "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9705,7 +9538,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-13" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9715,7 +9554,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Severity" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9727,21 +9566,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 7 Severity Levels from Extremely High to Extremely Low" + "@value": "Something that acts as or causes Harm to humans" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "7 Severity Levels" + "@value": "Harm" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept refers to the general abstract notion of harm" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExtremelyHighLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#IllegalDataProcessing", "@type": [ - "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9752,12 +9597,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.99,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nfbea264abf694083a7d1db8b2101092b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9767,7 +9618,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9779,27 +9630,43 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Extremely High" + "@value": "Something that acts as or causes Illegal Processing of Data" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Likelihood" + "@value": "Illegal Data Processing" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" + "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L5", + "@id": "_:Nfbea264abf694083a7d1db8b2101092b", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#MonitorRiskControl", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9810,12 +9677,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.31,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9825,7 +9687,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9837,47 +9699,67 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High" + "@value": "Control that monitors another Control" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:3 L:5)" + "@value": "Monitor Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L1", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://www.w3.org/TeamSubmission/n3/" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/format": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://www.iana.org/assignments/media-types/text/n3" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/title": [ { - "@value": "0.04,xsd:decimal" + "@value": "Risk Concepts - N3 serialiation" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://w3id.org/dpv/risk/risk-owl.n3" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#isVulnerabilityOf", + "@type": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" + ], + "http://purl.org/dc/dcam/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9889,21 +9771,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Indicates the vulnerability (subject) is associated with indicated context (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:2 L:1)" + "@value": "is vulnerability of" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L3", + "@id": "https://w3id.org/dpv/risk/owl#MonitorRisk", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9914,12 +9801,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.48,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9929,7 +9811,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9941,37 +9823,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + "@value": "Control that monitors a Risk" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:4 L:3)" + "@value": "Monitor Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L2", + "@id": "https://w3id.org/dpv/risk/owl#RiskManagement", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-06-12" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.08,xsd:decimal" + "@language": "en", + "@value": "ISO 31073:2022 Risk management vocabulary" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9981,7 +9858,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9993,18 +9870,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low" + "@value": "Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:2 L:2)" + "@value": "Risk Management" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L6", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L4", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -10023,7 +9900,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.86,xsd:decimal" + "@value": "0.57,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10045,32 +9922,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:7 L:6)" + "@value": "Very High Risk (RM7x7 S:7 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SystemMalfunction", + "@id": "https://w3id.org/dpv/risk/owl#Fee", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], "http://purl.org/dc/terms/modified": [ @@ -10081,7 +9958,8 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N1c2325e64024454ebc2e79f9e388cf3b" + "@language": "en", + "@value": "DGA 2.10" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10091,52 +9969,30 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Malfunction" + "@value": "Something that acts as or provides fees e.g. for using a service" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Malfunction" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here system refers to both hardware and software systems" - } - ] - }, - { - "@id": "_:N1c2325e64024454ebc2e79f9e388cf3b", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Fee" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Blackmail", + "@id": "https://w3id.org/dpv/risk/owl#SystemIntrusion", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -10161,7 +10017,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N3ef9f5a9eb554279905f69c263712205" + "@id": "_:Ne8bd9725515e46d0a941f4a4665a7868" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10170,8 +10026,17 @@ } ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, { "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10183,65 +10048,48 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Blackmail" + "@value": "Something that acts as or causes System Intrusion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Blackmail" + "@value": "System Intrusion" } ] }, { - "@id": "_:N3ef9f5a9eb554279905f69c263712205", + "@id": "_:Ne8bd9725515e46d0a941f4a4665a7868", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Incident", + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels", "@type": [ + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - }, - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples/owl#E0069" - }, - { - "@id": "https://w3id.org/dpv/examples/owl#E0070" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10251,10 +10099,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" - }, - { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv/owl#Likelihood" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10266,27 +10111,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "An actual or occured event" + "@value": "Scale with 7 Likelihood Levels from Extremely High to Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Incident is realised or materialised risk" + "@value": "7 Likelihood Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L6", + "@id": "https://w3id.org/dpv/risk/owl#MalwareAttack", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -10300,9 +10139,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.73,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6fb9cc1510c4401a9c582949b7a8c8b7" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10312,7 +10157,16 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10324,19 +10178,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High" + "@value": "Something that acts as or causes Malware Attack" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:6 L:6)" + "@value": "Malware Attack" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus", + "@id": "_:N6fb9cc1510c4401a9c582949b7a8c8b7", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L4", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -10348,12 +10219,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" } ], - "http://purl.org/vocab/vann/example": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/examples/owl#E0069" + "@value": "0.48,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10363,7 +10234,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Status" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10375,18 +10246,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Status associated with an incident" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Status" + "@value": "High Risk (RM5x5 S:3 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L3", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L1", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -10405,7 +10276,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.43,xsd:decimal" + "@value": "0.10,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10427,21 +10298,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:7 L:3)" + "@value": "Very Low Risk (RM7x7 S:5 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentHalted", + "@id": "https://w3id.org/dpv/risk/owl#VeryHighRisk", "@type": [ - "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -10452,7 +10323,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.9,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10462,7 +10338,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10474,38 +10353,43 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident has halted or paused with a high likelihood of resuming or recurring" + "@value": "Level where Risk is Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Halted" + "@value": "Very High Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RightsLimitation", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L5", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.61,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10515,7 +10399,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10527,27 +10411,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Limitation of Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Limitation of Rights" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0" + "@value": "Very High Risk (RM7x7 S:6 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RemoveConsequence", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L1", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -10558,7 +10436,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10568,7 +10451,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConsequenceControl" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10580,43 +10463,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that removes Consequence i.e. prevents it from materialising" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remove Consequence" + "@value": "Low Risk (RM5x5 S:5 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PublicOrderBreach", + "@id": "https://w3id.org/dpv/risk/owl#isExploitedBy", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv/risk/owl#Threat" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N2bd2812bbacb46319d2bdb0e95e02f65" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10624,11 +10500,6 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -10638,34 +10509,28 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Public Order Breach" + "@value": "Indicates the vulnerability (subject) is exploited by the indicated threat (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Public Order Breach" + "@value": "is exploited by" } - ] - }, - { - "@id": "_:N2bd2812bbacb46319d2bdb0e95e02f65", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "https://schema.org/domainIncludes": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ], - "https://schema.org/url": [ + "https://schema.org/rangeIncludes": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/risk/owl#Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L5", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L1", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -10684,7 +10549,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.61,xsd:decimal" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10706,53 +10571,44 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:6 L:5)" + "@value": "Very Low Risk (RM7x7 S:6 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3", + "@id": "https://w3id.org/dpv/risk/owl#AuthorisationFailure", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TeamSubmission/n3/" - } + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://www.iana.org/assignments/media-types/text/n3" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/title": [ + "http://purl.org/dc/terms/created": [ { - "@value": "Risk Concepts - N3 serialiation" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.n3" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://purl.org/dc/terms/source": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@id": "_:N588812d3250243469d4d5b0cbd82dc9e" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#JudicialPenalty", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -10761,7 +10617,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10773,52 +10635,89 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that involves or causes judicial penalties to be paid" + "@value": "Something that acts as or causes Authorisation Failure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Judicial Penalty" + "@value": "Authorisation Failure" } ] }, { - "@id": "https://w3id.org/dpv/guides", + "@id": "_:N588812d3250243469d4d5b0cbd82dc9e", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/conformsTo": [ + "https://schema.org/name": [ { - "@id": "https://www.w3.org/TR/html/" + "@value": "ENISa Trust Services Security Incidents 2021" } ], - "http://purl.org/dc/terms/format": [ + "https://schema.org/url": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L2", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/title": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "Guides for Data Privacy Vocabulary" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/guides" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@value": "0.16,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Low Risk (RM5x5 S:2 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L5", + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -10829,12 +10728,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.20,xsd:decimal" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10844,7 +10738,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/owl#RiskLevel" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10856,21 +10750,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" + "@value": "Scale with 7 Risk Levels from Extremely High to Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:2 L:5)" + "@value": "7 Risk Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnwantedDisclosureData", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedResourceUse", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -10892,7 +10786,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N12b2c9394da44250a5ab771adc23fab8" + "@id": "_:N605e2cac18a74200ab14cc33e319b6cb" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10903,6 +10797,9 @@ "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10914,18 +10811,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Disclosure of Data" + "@value": "Something that acts as or causes Unauthorised Resource Use" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Disclosure of Data" + "@value": "Unauthorised Resource Use" } ] }, { - "@id": "_:N12b2c9394da44250a5ab771adc23fab8", + "@id": "_:N605e2cac18a74200ab14cc33e319b6cb", "@type": [ "https://schema.org/WebPage" ], @@ -10941,12 +10838,28 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityBreach", + "@id": "https://w3id.org/dpv/risk/owl#ExtremelyLowLikelihood", "@type": [ + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.01,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -10954,7 +10867,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#DataBreach" + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10962,13 +10875,31 @@ "@language": "en", "@value": "accepted" } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Level where Likelihood is Extremely Low" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Extremely Low Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" + } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorConsequence", + "@id": "https://w3id.org/dpv/risk/owl#ExtremelyHighRisk", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -10976,10 +10907,15 @@ "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10989,7 +10925,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11001,21 +10937,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Consequence" + "@value": "Level where Risk is Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Consequence" + "@value": "Extremely High Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity", + "@id": "https://w3id.org/dpv/risk/owl#JudicialCosts", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11025,7 +10967,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11037,32 +10979,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Activity" + "@value": "Something that involves or causes judicial costs to be paid" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Activity" + "@value": "Judicial Costs" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Detriment", + "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccount", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -11071,6 +11013,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N252928e4ed0f4c6ea83876f7fb2c3d78" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -11078,7 +11025,16 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11090,79 +11046,48 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Detriment" + "@value": "Something that acts as or causes a compromised account that is then used by the compromiser" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Detriment" + "@value": "Compromise Account" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7", + "@id": "_:N252928e4ed0f4c6ea83876f7fb2c3d78", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Risk Matrix 7x7" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedReidentification", + "@id": "https://w3id.org/dpv/risk/owl#Benefit", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-03-23" } ], "http://purl.org/dc/terms/modified": [ @@ -11178,7 +11103,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11190,18 +11115,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Re-Identification" + "@value": "Something that acts as or causes benefits" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Re-Identification" + "@value": "Benefit" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CopyrightViolation", + "@id": "https://w3id.org/dpv/risk/owl#DenialServiceAttack", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -11226,7 +11151,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N73922ea12cd34584b91e209f306167ae" + "@id": "_:N8705162a41ca472c9e3867ec5902de25" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11236,7 +11161,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11248,37 +11176,73 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Copyright Violation" + "@value": "Something that acts as or causes Denial of Service Attack (DoS)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Copyright Violation" + "@value": "Denial of Service Attack (DoS)" } ] }, { - "@id": "_:N73922ea12cd34584b91e209f306167ae", + "@id": "_:N8705162a41ca472c9e3867ec5902de25", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S3L1", + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/owl#RiskConcept" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Risks and issues that arise during operational processes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Operational Security Risk" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L3", + "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -11294,7 +11258,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.33,xsd:decimal" + "@value": "0.43,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11304,7 +11268,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11316,21 +11280,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM3x3 S:3 L:1)" + "@value": "High Risk (RM7x7 S:7 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L7", + "@id": "https://w3id.org/dpv/risk/owl#Cryptojacking", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -11344,9 +11308,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.14,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N3adf839933da482c89a2828fc9743969" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11356,7 +11326,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11368,18 +11341,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low" + "@value": "Something that acts as or causes Cryptojacking" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:1 L:7)" + "@value": "Cryptojacking" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IllegalDataProcessing", + "@id": "_:N3adf839933da482c89a2828fc9743969", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Threat Landscape 2021" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#PsychologicalHarm", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -11404,7 +11393,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N83bd5296b4d94804a73f0e0518c39495" + "@id": "_:N0ddf524630684b719d7f03f907c20cff" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11414,7 +11403,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11426,54 +11415,47 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Illegal Processing of Data" + "@value": "Something that acts as or causes Psychological Harm" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Illegal Data Processing" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0" + "@value": "Psychological Harm" } ] }, { - "@id": "_:N83bd5296b4d94804a73f0e0518c39495", + "@id": "_:N0ddf524630684b719d7f03f907c20cff", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskManagement", + "@id": "https://w3id.org/dpv/risk/owl#hasControl", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-06-12" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "ISO 31073:2022 Risk management vocabulary" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11481,11 +11463,6 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -11495,21 +11472,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk" + "@value": "Indicates the use of specified control" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Management" + "@value": "has control" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentOngoing", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L7", "@type": [ - "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -11520,7 +11502,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.14,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11530,7 +11517,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11542,21 +11529,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident is ongoing i.e. still active" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Ongoing" + "@value": "Low Risk (RM7x7 S:1 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VeryHighRisk", + "@id": "https://w3id.org/dpv/risk/owl#VeryHighLikelihood", "@type": [ + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -11582,10 +11569,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" }, { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11597,13 +11584,13 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Very High" + "@value": "Level where Likelihood is Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk" + "@value": "Very High Likelihood" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ @@ -11614,15 +11601,32 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityIncident", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeModification", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Ncecbd81981b3460f9cede6031d4ab8b1" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11632,7 +11636,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11644,18 +11651,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident where the confidentiality of information or system has been affected" + "@value": "Something that acts as or causes Unauthorised Code Modification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confidentiality Incident" + "@value": "Unauthorised Code Modification" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3", + "@id": "_:Ncecbd81981b3460f9cede6031d4ab8b1", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L5", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -11672,6 +11695,11 @@ "@value": "2022-08-17" } ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.31,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -11679,7 +11707,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11691,18 +11719,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix 3x3" + "@value": "High Risk (RM7x7 S:3 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Compensation", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemModification", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -11710,13 +11738,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -11725,6 +11753,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N029a97b214024c18a899586cb3864d2a" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -11732,7 +11765,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11744,21 +11780,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms" + "@value": "Something that acts as or causes Unauthorised System Modification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compensation" + "@value": "Unauthorised System Modification" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RemoveImpact", + "@id": "_:N029a97b214024c18a899586cb3864d2a", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Injury", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -11769,7 +11821,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Na6c5e17bb8ac4135b62412f66dd88460" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11779,7 +11842,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ImpactControl" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11791,23 +11854,55 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that removes Impact i.e. prevents it from materialising" + "@value": "Something that acts as or causes Injury" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remove Impact" + "@value": "Injury" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ComponentFailure", + "@id": "_:Na6c5e17bb8ac4135b62412f66dd88460", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAssessment", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N99d1d0a8b80740559dacd97d8fb47665" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -11815,7 +11910,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11827,27 +11922,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Component Failure" + "@value": "Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other." } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Component Failure" + "@value": "Risk Matrix" } + ] + }, + { + "@id": "_:N99d1d0a8b80740559dacd97d8fb47665", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of" + "@value": "IEC 31010:2019" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/72140.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#InterceptCommunications", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L3", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -11861,15 +11966,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N9ba04625c759479eba79e0016163e8e6" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11879,52 +11978,30 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Interception of Communications" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Intercept Communications" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N9ba04625c759479eba79e0016163e8e6", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Moderate Risk (RM5x5 S:2 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseTrust", + "@id": "https://w3id.org/dpv/risk/owl#ExposureToHarmfulSpeech", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -11949,7 +12026,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nbb93cef662444084828d04948d35895d" + "@id": "_:N95f46ba999c74717949420ed05a75570" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11959,7 +12036,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11971,54 +12048,59 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Trust" + "@value": "Something that acts as or causes Harmful Speech" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Trust" + "@value": "Exposure to Harmful Speech" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0" } ] }, { - "@id": "_:Nbb93cef662444084828d04948d35895d", + "@id": "_:N95f46ba999c74717949420ed05a75570", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SocialDisadvantage", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S1L3", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.33,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12028,7 +12110,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12040,21 +12122,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Social Disadvantage" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Social Disadvantage" + "@value": "Moderate Risk (RM3x3 S:1 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L3", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemAccess", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -12068,9 +12150,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.24,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6fdf74981d95420a82b9c97acf9aa9eb" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12080,7 +12168,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12092,21 +12186,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" + "@value": "Something that acts as or causes Unauthorised System Access" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:4 L:3)" + "@value": "Unauthorised System Access" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseCustomerConfidence", + "@id": "_:N6fdf74981d95420a82b9c97acf9aa9eb", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#BruteForceAuthorisations", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -12128,7 +12238,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0d138f94265e46f293490fbe0fc8074c" + "@id": "_:Nb75b090fdcda4ec38e841680681bf642" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12138,7 +12248,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12150,34 +12266,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Customer Confidence" + "@value": "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Customer Confidence" + "@value": "Brute Force Authorisations" } ] }, { - "@id": "_:N0d138f94265e46f293490fbe0fc8074c", + "@id": "_:Nb75b090fdcda4ec38e841680681bf642", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S1L1", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L4", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -12196,7 +12312,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.11,xsd:decimal" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12206,7 +12322,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12218,32 +12334,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM3x3 S:1 L:1)" + "@value": "Very Low Risk (RM7x7 S:1 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RightsImpact", + "@id": "https://w3id.org/dpv/risk/owl#RiskSource", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-02-14" } ], "http://purl.org/dc/terms/modified": [ @@ -12252,11 +12362,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N4e0b95db2d414e7588f607d2edf6902e" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -12264,10 +12369,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Impact" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12279,54 +12381,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Impact to Rights" + "@value": "The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Impact to Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ImpactToRights\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N4e0b95db2d414e7588f607d2edf6902e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Risk Source" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataAccess", + "@id": "https://w3id.org/dpv/risk/owl#Reward", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], "http://purl.org/dc/terms/modified": [ @@ -12335,11 +12415,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nc799e152712d4ee48d59c2a1366fca7f" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -12347,7 +12422,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12359,37 +12434,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Access" + "@value": "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Access" - } - ] - }, - { - "@id": "_:Nc799e152712d4ee48d59c2a1366fca7f", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Reward" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#EquipmentMalfunction", + "@id": "https://w3id.org/dpv/risk/owl#DataBreach", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -12411,7 +12470,15 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N7f1dc230141c4448a99f28f362191020" + "@id": "_:N0353966748ad43cc9b9c03081ec6b6f9" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples/owl#E0071" + }, + { + "@id": "https://w3id.org/dpv/examples/owl#E0069" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12421,7 +12488,16 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12433,24 +12509,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Equipment Malfunction" + "@value": "Something that acts as or causes Data Breach" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Equipment Malfunction" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here equipment refers to physical equipment" + "@value": "Data Breach" } ] }, { - "@id": "_:N7f1dc230141c4448a99f28f362191020", + "@id": "_:N0353966748ad43cc9b9c03081ec6b6f9", "@type": [ "https://schema.org/WebPage" ], @@ -12466,16 +12536,21 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RemedyControl", + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatusUnknown", "@type": [ + "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12485,7 +12560,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12497,41 +12572,31 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to remedy consequences of event" + "@value": "The status of a incident is unknown" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remedy Control" + "@value": "Incident Status Unknown" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#exploitsVulnerability", + "@id": "https://w3id.org/dpv/risk/owl#IntentionalMisuse", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" - ], - "http://purl.org/dc/dcam/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Threat" - } - ], - "http://purl.org/dc/dcam/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" - } + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12543,37 +12608,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the threat (subject) exploits the indicated vulnerability (object)" + "@value": "Intentional Misuse" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "exploits vulnerability" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Threat" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@value": "Intentional Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorRisk", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "@id": "https://w3id.org/dpv/risk/owl#IntegrityIncident", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { @@ -12588,7 +12637,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12600,22 +12649,28 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk" + "@value": "Incident where the integrity of information or system has been affected" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Risk" + "@value": "Integrity Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DeliberateIncident", + "@id": "https://w3id.org/dpv/risk/owl#HaltSource", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", @@ -12629,7 +12684,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@id": "https://w3id.org/dpv/risk/owl#SourceControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12641,18 +12696,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident caused due to deliberate actions of a human" + "@value": "Control that halts the risk source or prevents it from materialising" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Deliberate Incident" + "@value": "Halt Source" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S3L2", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L5", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -12671,7 +12726,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.67,xsd:decimal" + "@value": "0.40,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12681,7 +12736,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12693,31 +12748,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM3x3 S:3 L:2)" + "@value": "High Risk (RM5x5 S:2 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#hasControl", + "@id": "https://w3id.org/dpv/risk/owl#HighSeverity", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" + "https://w3id.org/dpv/owl#Severity", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.75,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12725,6 +12786,17 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -12734,37 +12806,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the use of specified control" + "@value": "Level where Severity is High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has control" + "@value": "High Severity" } ], - "https://schema.org/rangeIncludes": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseReputation", + "@id": "https://w3id.org/dpv/risk/owl#Detriment", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-23" } ], "http://purl.org/dc/terms/modified": [ @@ -12773,11 +12846,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N0282f3114f5b4278b632620b9b954c7d" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -12785,7 +12853,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12797,57 +12865,47 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Reputation" + "@value": "Something that acts as or causes Detriment" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Reputation" + "@value": "Detriment" } ] }, { - "@id": "_:N0282f3114f5b4278b632620b9b954c7d", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L7", "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Harshvardhan J. Pandit" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#hasThreatSource", - "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk/owl#Threat" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/risk/owl#ThreatSource" + "@value": "0.29,xsd:decimal" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12859,39 +12917,57 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the threat (subject) has the indicated source (object)" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has threat source" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Threat" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#ThreatSource" + "@value": "Moderate Risk (RM7x7 S:2 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeAccess", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N99568e0cd3774d348d85262f04bc3a0b" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" } ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, { "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } @@ -12905,26 +12981,53 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes an attack on security with the aim of undermining it" + "@value": "Something that acts as or causes Unauthorised Code Access" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Security Attack" + "@value": "Unauthorised Code Access" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentNotice", + "@id": "_:N99568e0cd3774d348d85262f04bc3a0b", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S3L2", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.67,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12934,7 +13037,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Notice" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12946,43 +13049,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Notice associated with an Incident" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Notice" + "@value": "High Risk (RM3x3 S:3 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolenceAgainstChildren", + "@id": "https://w3id.org/dpv/risk/owl#IncidentOngoingReport", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nb34535276ddd4a56ac18dcc8fc489cbb" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12992,7 +13078,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13004,40 +13090,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Child Violence" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Violence against children" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ChildViolence\" in DPV 2.0" - } - ] - }, - { - "@id": "_:Nb34535276ddd4a56ac18dcc8fc489cbb", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@language": "en", + "@value": "Incident Ongoing Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Terrorism", + "@id": "https://w3id.org/dpv/risk/owl#LoseNegotiatingCapacity", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -13062,7 +13126,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nf6a25073f9274363bcb649fe8540fc70" + "@id": "_:Nf8d97cf300cf44d5881be9535d0b1dff" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13072,7 +13136,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13084,18 +13148,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Terrorism" + "@value": "Something that acts as or causes Loss of Negotiating Capacity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Terrorism" + "@value": "Lose of Negotiating Capacity" } ] }, { - "@id": "_:Nf6a25073f9274363bcb649fe8540fc70", + "@id": "_:Nf8d97cf300cf44d5881be9535d0b1dff", "@type": [ "https://schema.org/WebPage" ], @@ -13111,9 +13175,9 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExtremelyHighSeverity", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L4", "@type": [ - "https://w3id.org/dpv/owl#Severity", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -13125,12 +13189,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.99,xsd:decimal" + "@value": "0.41,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13140,7 +13204,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13152,214 +13216,241 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Extremely High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" + "@value": "High Risk (RM7x7 S:5 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L7", + "@id": "https://w3id.org/dpv/risk/owl#", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/ns/dx/prof/Profile", + "http://www.w3.org/2002/07/owl#Ontology" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/bibliographicCitation": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "@value": "http://www.w3.org/2004/02/skos/core" + }, { - "@value": "0.99,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "@id": "http://www.w3.org/2002/07/owl" + }, { - "@id": "https://w3id.org/dpv/risk/owl#" + "@value": "http://www.w3.org/2000/01/rdf-schema" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@value": "Julian Flake" + }, + { + "@value": "Rob Brennan" + }, + { + "@value": "Fajar Ekaputra" + }, + { + "@value": "Harshvardhan J. Pandit" + }, + { + "@value": "Beatriz Esteves" + }, + { + "@value": "Axel Polleres" + }, + { + "@value": "Georg P. Krog" + }, + { + "@value": "Julio Fernandez" + }, + { + "@value": "Delaram Golpayegani" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/created": [ { "@language": "en", - "@value": "accepted" + "@value": "2022-08-14" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/creator": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "@value": "Paul Ryan" + }, { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:7 L:7)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ImpactControl", - "@type": [ - "https://w3id.org/dpv/risk/owl#RiskControl", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ + "@value": "Georg P. Krog" + }, + { + "@language": "en", + "@value": "Delaram Golpayegani" + }, { + "@language": "en", "@value": "Harshvardhan J. Pandit" + }, + { + "@language": "en", + "@value": "Beatriz Esteves" + }, + { + "@language": "en", + "@value": "Rob Brennan" + }, + { + "@language": "en", + "@value": "Julian Flake" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/description": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@language": "en", + "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/hasVersion": [ { "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/identifier": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@value": "https://w3id.org/dpv/risk" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/issued": [ { "@language": "en", - "@value": "accepted" + "@value": "2022-08-14" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/license": [ { - "@language": "en", - "@value": "Risk Mitigation Measure that controls Impacts" + "@id": "https://www.w3.org/copyright/document-license-2023/" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/modified": [ { "@language": "en", - "@value": "Impact Control" + "@value": "2024-07-13" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingPolicy", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/publisher": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://www.w3.org/" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://www.w3.org/groups/cg/dpvcg/" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/title": [ { "@language": "en", - "@value": "accepted" + "@value": "Risk Concepts" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/ontology/bibo/doi": [ { - "@language": "en", - "@value": "Something that acts as or causes violation of policy which can be either internal or external policy" + "@value": "10.5281/zenodo.12505841" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/ontology/bibo/status": [ { - "@language": "en", - "@value": "Violating Policy" + "@value": "http://purl.org/ontology/bibo/status/published" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L5", - "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/vocab/vann/preferredNamespacePrefix": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "risk" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/vocab/vann/preferredNamespaceUri": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#Label": [ { - "@value": "0.40,xsd:decimal" + "@language": "en", + "@value": "RISK" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2002/07/owl#versionIRI": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://w3id.org/dpv/2.1-dev/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2002/07/owl#versionInfo": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@value": "2.1-dev" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/ns/dx/prof/hasResource": [ { - "@language": "en", - "@value": "accepted" + "@id": "https://w3id.org/dpv/examples" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld" + }, + { + "@id": "https://w3id.org/dpv/primer" + }, + { + "@id": "https://w3id.org/dpv/guides" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-html" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/ns/dx/prof/isProfileOf": [ + { + "@id": "http://www.w3.org/2002/07/owl" + }, + { + "@id": "https://w3id.org/dpv/owl" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://xmlns.com/foaf/0.1/logo": [ { - "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" + "@id": "https://w3id.org/dpv/media/logo.png" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/version": [ { - "@language": "en", - "@value": "High Risk (RM5x5 S:2 L:5)" + "@value": "2.1-dev" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RemoveSource", + "@id": "https://w3id.org/dpv/risk/owl#SourceControl", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -13380,7 +13471,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SourceControl" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13392,43 +13483,31 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that removes the risk source" + "@value": "Risk Mitigation Measure that controls the Source" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remove Source" + "@value": "Source Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedAccesstoPremises", + "@id": "https://w3id.org/dpv/risk/owl#hasIncident", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N2b8ae4e96b21406bb91bfdec8f460776" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13436,11 +13515,6 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -13450,37 +13524,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Access to Premises" + "@value": "Indicates an incident is associated with the specified context" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Access to Premises" - } - ] - }, - { - "@id": "_:N2b8ae4e96b21406bb91bfdec8f460776", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "has incident" } ], - "https://schema.org/url": [ + "https://schema.org/rangeIncludes": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DataCorruption", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L7", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -13494,15 +13557,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Ncd7b81f0daef4263a47284ebb48b83f6" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13512,55 +13569,33 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Corruption of Data" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Corruption" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"Corruption Data\" in DPV 2.0" - } - ] - }, - { - "@id": "_:Ncd7b81f0daef4263a47284ebb48b83f6", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Extremely High Risk (RM7x7 S:7 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnwantedDataDeletion", + "@id": "https://w3id.org/dpv/risk/owl#Terrorism", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -13582,7 +13617,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N7ff2bed0d152400e90aff3c52f1320b0" + "@id": "_:N84e706a33b7c462194d2c8fb5c04326c" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13592,7 +13627,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13604,18 +13639,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Data Deletion" + "@value": "Something that acts as or causes Terrorism" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Data Deletion" + "@value": "Terrorism" } ] }, { - "@id": "_:N7ff2bed0d152400e90aff3c52f1320b0", + "@id": "_:N84e706a33b7c462194d2c8fb5c04326c", "@type": [ "https://schema.org/WebPage" ], @@ -13631,38 +13666,16 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L1", + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.08,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -13672,21 +13685,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Risks and issues that affect or have the potential to affect specific individuals" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:4 L:1)" + "@value": "Individual Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L4", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingEthicsCode", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -13700,9 +13713,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.16,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N5971f1bb7e3149b49a4335be11b0926f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13712,107 +13731,52 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low" + "@value": "Something that acts as or causes Violation of Ethics Code" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:2 L:4)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#MonitorVulnerabilities", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Control that monitors a Risk Vulnerability" + "@value": "Violating Ethics Code" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Monitor Vulnerabilities" + "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IndividualHealthSafety", + "@id": "_:N5971f1bb7e3149b49a4335be11b0926f", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "accepted" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Individual Health & Safety" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ConsequenceControl", + "@id": "https://w3id.org/dpv/risk/owl#RemoveConsequence", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskControl", @@ -13836,7 +13800,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#ConsequenceControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13848,21 +13812,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that controls the Consequences" + "@value": "Control that removes Consequence i.e. prevents it from materialising" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Consequence Control" + "@value": "Remove Consequence" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L2", + "@id": "https://w3id.org/dpv/risk/owl#LoseGoodwill", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -13876,9 +13840,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ { - "@value": "0.12,xsd:decimal" + "@id": "_:N194bc10f01ef4bdb99f12487816e6826" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13888,7 +13858,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13900,21 +13870,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Something that acts as or causes Loss of Goodwill" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:3 L:2)" + "@value": "Lose of Goodwill" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L5", + "@id": "_:N194bc10f01ef4bdb99f12487816e6826", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#PersonalSafetyEndangerment", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -13928,9 +13914,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.51,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Na783f8da28594e8794173492db9ecac9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13940,7 +13932,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13952,32 +13944,54 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" + "@value": "Something that acts as or causes Personal Safety Endangerment" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:5 L:5)" + "@value": "Personal Safety Endangerment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels", + "@id": "_:Na783f8da28594e8794173492db9ecac9", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Misuse", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskLevel", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Delaram Golpayegani" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-06-11" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13987,7 +14001,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskLevel" + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13999,21 +14013,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 3 Risk Levels from High to Low" + "@value": "Something that acts as or causes Misuse" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "3 Risk Levels" + "@value": "Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VeryHighSeverity", + "@id": "https://w3id.org/dpv/risk/owl#EquipmentMalfunction", "@type": [ - "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -14024,12 +14038,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.9,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N53bfad5db8324151841ce01472d06f41" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14039,10 +14059,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" }, { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14054,47 +14074,59 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Very High" + "@value": "Something that acts as or causes Equipment Malfunction" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Severity" + "@value": "Equipment Malfunction" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" + "@value": "Here equipment refers to physical equipment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#refersToRisk", + "@id": "_:N53bfad5db8324151841ce01472d06f41", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" + "https://schema.org/WebPage" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/owl#Incident" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "https://schema.org/url": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#VeryLowRisk", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskLevel", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-18" } ], - "http://purl.org/vocab/vann/example": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/examples/owl#E0069" + "@value": "0.1,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14102,6 +14134,14 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -14111,58 +14151,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the incident (subject) is a materialisation of the indicated risk (object)" + "@value": "Level where Risk is Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "refers to risk" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/owl#Incident" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/owl#Risk" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#SocietalHealthSafety", - "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" + "@value": "Very Low Risk" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Societal Health & Safety" + "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#EquipmentFailure", + "@id": "https://w3id.org/dpv/risk/owl#IdentityTheft", "@type": [ "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -14187,7 +14193,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nc281053cb7ff4095b5eef42624c4ff46" + "@id": "_:N33b7660d50a4461e927089957dfd848b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14198,6 +14204,9 @@ "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14209,43 +14218,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Equipment Failure" + "@value": "Something that acts as or causes Identity Theft" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Equipment Failure" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here equipment refers to physical equipment" + "@value": "Identity Theft" } ] }, { - "@id": "_:Nc281053cb7ff4095b5eef42624c4ff46", + "@id": "_:N33b7660d50a4461e927089957dfd848b", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L6", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedAccesstoPremises", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -14259,9 +14262,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.49,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N7487c570f8f54358874e08fa38c8f27d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14271,7 +14280,16 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14283,62 +14301,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" + "@value": "Something that acts as or causes Unauthorised Access to Premises" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:4 L:6)" + "@value": "Unauthorised Access to Premises" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RecoveryControl", + "@id": "_:N7487c570f8f54358874e08fa38c8f27d", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskControl", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "Control to recover from event" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Recovery Control" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels", + "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels", "@type": [ - "https://w3id.org/dpv/owl#Likelihood", + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -14360,7 +14352,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Likelihood" + "@id": "https://w3id.org/dpv/owl#Severity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14372,21 +14364,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 3 Likelihood Levels from High to Low" + "@value": "Scale with 3 Severity Levels from High to Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "3 Likelihood Levels" + "@value": "3 Severity Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExtremelyLowSeverity", + "@id": "https://w3id.org/dpv/risk/owl#UnwantedDisclosureData", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -14397,12 +14389,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.01,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nf14815c8a8694940bcdb35d12bf37b11" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14412,7 +14410,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14424,24 +14425,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Extremely Low" + "@value": "Something that acts as or causes Unwanted Disclosure of Data" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Severity" + "@value": "Unwanted Disclosure of Data" } + ] + }, + { + "@id": "_:Nf14815c8a8694940bcdb35d12bf37b11", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ChangeImpact", + "@id": "https://w3id.org/dpv/risk/owl#ChangeConsequence", "@type": [ "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -14465,7 +14476,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ImpactControl" + "@id": "https://w3id.org/dpv/risk/owl#ConsequenceControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14477,21 +14488,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that changes Impact" + "@value": "Control that changes Consequence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Change Impact" + "@value": "Change Consequence" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#HaltSource", + "@id": "https://w3id.org/dpv/risk/owl#ExtremelyLowRisk", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -14502,7 +14513,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.01,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14512,7 +14528,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SourceControl" + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14524,37 +14540,42 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that halts the risk source or prevents it from materialising" + "@value": "Level where Risk is Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Halt Source" + "@value": "Extremely Low Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L4", + "@id": "https://w3id.org/dpv/risk/owl#hasThreatSource", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#Threat" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv/risk/owl#ThreatSource" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/created": [ { - "@value": "0.24,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14562,11 +14583,6 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -14576,21 +14592,31 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Indicates the threat (subject) has the indicated source (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:3 L:4)" + "@value": "has threat source" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Threat" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#ThreatSource" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L3", + "@id": "https://w3id.org/dpv/risk/owl#Extorsion", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -14604,9 +14630,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.06,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N78e6085a5a4a4a08adbcdb4af46722d9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14616,7 +14648,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14628,27 +14663,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low" + "@value": "Something that acts as or causes Extorsion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:1 L:3)" + "@value": "Extorsion" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SourceControl", + "@id": "_:N78e6085a5a4a4a08adbcdb4af46722d9", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", - "http://www.w3.org/2002/07/owl#Class" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ENISA Threat Taxonomy 2016" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IncidentMitigationMeasure", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { @@ -14663,7 +14708,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/owl#RiskMitigationMeasure" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14675,20 +14720,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that controls the Source" + "@value": "A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Source Control" + "@value": "Incident Mitigation Measure" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L5", + "@id": "https://w3id.org/dpv/risk/owl#ExtremelyLowSeverity", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -14700,12 +14745,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.80,xsd:decimal" + "@value": "0.01,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14715,7 +14760,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14727,21 +14772,58 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High" + "@value": "Level where Severity is Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:4 L:5)" + "@value": "Extremely Low Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L1", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - RDF/XML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.rdf" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedInformationDisclosure", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -14755,9 +14837,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.12,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N89971235b5e34930a94f46c696e0ac94" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14767,7 +14855,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14779,21 +14870,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Something that acts as or causes Unauthorised Information Disclosure" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Unauthorised Information Disclosure" + } + ] + }, + { + "@id": "_:N89971235b5e34930a94f46c696e0ac94", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Very Low Risk (RM5x5 S:3 L:1)" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#HighSeverity", + "@id": "https://w3id.org/dpv/risk/owl#Reidentification", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Severity", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -14804,12 +14911,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.75,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14819,13 +14927,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" }, { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14837,27 +14942,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is High" + "@value": "Something that acts as or causes Re-identification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Severity" + "@value": "Re-identification" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" + "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatusUnknown", + "@id": "https://w3id.org/dpv/risk/owl#IncidentImpactAssessment", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -14868,7 +14972,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14878,7 +14982,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + "@id": "https://w3id.org/dpv/owl#ImpactAssessment" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14890,18 +14994,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The status of a incident is unknown" + "@value": "An impact assessment associated with a incident" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Status Unknown" + "@value": "Incident Impact Assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingStatutoryObligations", + "@id": "https://w3id.org/dpv/risk/owl#RightsImpact", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -14926,7 +15030,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb5000792f7ae42ffb4c7efe3b93be7df" + "@id": "_:N7b552ef83c274f84b167cc68c23676bb" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14936,36 +15040,39 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/owl#Impact" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Statutory Obligations" + "@value": "Something that acts as or causes Impact to Rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Statutory Obligations" + "@value": "Impact to Rights" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0" + "@value": "This concept was called \"ImpactToRights\" in DPV 2.0" } ] }, { - "@id": "_:Nb5000792f7ae42ffb4c7efe3b93be7df", + "@id": "_:N7b552ef83c274f84b167cc68c23676bb", "@type": [ "https://schema.org/WebPage" ], @@ -14981,26 +15088,27 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L3", + "@id": "https://w3id.org/dpv/risk/owl#Renumeration", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.36,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15010,7 +15118,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15022,26 +15130,43 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Something that acts as or provides renumeration which is in monetary or financial form" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:3 L:3)" + "@value": "Remuneration" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityIncident", + "@id": "https://w3id.org/dpv/risk/owl#FinancialLoss", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N698d6b9272804e2dba685b14f6e69152" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15051,7 +15176,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15063,57 +15188,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident where the availability of information or system has been affected" + "@value": "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Availability Incident" + "@value": "Financial Loss" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact", + "@id": "_:N698d6b9272804e2dba685b14f6e69152", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/owl#RiskConcept" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "Things that cause or have the potential to impact financial resources" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Financial Impact" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VeryHighLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#AvoidSource", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -15124,12 +15229,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.9,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15139,10 +15239,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#SourceControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15154,27 +15251,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Very High" + "@value": "Control that avoids the risk source" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" + "@value": "Avoid Source" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Harm", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L3", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -15185,13 +15276,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-13" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.31,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15201,7 +15291,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15213,44 +15303,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Harm to humans" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Harm" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept refers to the general abstract notion of harm" + "@value": "Moderate Risk (RM7x7 S:5 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Renumeration", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S3L3", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15260,7 +15343,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15272,73 +15355,52 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides renumeration which is in monetary or financial form" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remuneration" + "@value": "High Risk (RM3x3 S:3 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L2", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.16,xsd:decimal" - } + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://www.w3.org/TR/turtle/" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://www.iana.org/assignments/media-types/text/turtle" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "accepted" + "@value": "Risk Concepts - Turtle serialiation" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low" + "@id": "https://w3id.org/dpv/risk/risk-owl.ttl" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "Low Risk (RM7x7 S:4 L:2)" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MalwareAttack", + "@id": "https://w3id.org/dpv/risk/owl#ModerateSeverity", "@type": [ + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -15349,18 +15411,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N933b42794d4f41a39ee17bc9b20bf774" + "@value": "0.5,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15370,7 +15426,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15382,37 +15444,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Malware Attack" + "@value": "Level where Severity is Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Malware Attack" - } - ] - }, - { - "@id": "_:N933b42794d4f41a39ee17bc9b20bf774", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "Moderate Severity" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L7", + "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels", "@type": [ + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -15423,12 +15475,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.57,xsd:decimal" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15438,7 +15485,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/owl#RiskLevel" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15450,34 +15497,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High" + "@value": "Scale with 3 Risk Levels from High to Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:4 L:7)" + "@value": "3 Risk Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ReduceSeverity", + "@id": "https://w3id.org/dpv/risk/owl#SocietalHealthSafety", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -15485,7 +15521,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReductionControl" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15494,21 +15530,15 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Control that reduces the severity of an event" - } - ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reduce Severity" + "@value": "Societal Health & Safety" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DetectionControl", + "@id": "https://w3id.org/dpv/risk/owl#RecoveryControl", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskControl", @@ -15539,45 +15569,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to detect event" + "@value": "Control to recover from event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Detection Control" + "@value": "Recovery Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MaliciousCodeAttack", + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N7beef942706b41468112e467b91c5f39" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -15585,7 +15593,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15597,59 +15605,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Malicious Code Attack" + "@value": "Things that cause or have the potential to impact financial resources" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Malicious Code Attack" + "@value": "Financial Impact" } ] }, { - "@id": "_:N7beef942706b41468112e467b91c5f39", + "@id": "https://w3id.org/dpv/risk/owl#hasRiskSource", "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "https://schema.org/url": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@id": "https://w3id.org/dpv/owl#Risk" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataDisclosure", - "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#RiskSource" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nf415d60c8c8849ba95e5611d481b06ce" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15657,11 +15642,6 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -15671,55 +15651,95 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Disclosure" + "@value": "Indicates the risk (subject) has the indicated risk source (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Disclosure" + "@value": "has risk source" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/owl#Risk" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskSource" } ] }, { - "@id": "_:Nf415d60c8c8849ba95e5611d481b06ce", + "@id": "https://w3id.org/dpv/guides", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://www.w3.org/TR/html/" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/format": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Guides for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/guides" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L2", + "@id": "https://w3id.org/dpv/primer", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://www.w3.org/TR/html/" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/format": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/title": [ { - "@value": "0.24,xsd:decimal" + "@value": "Primer for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/primer" } ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ComponentFailure", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -15727,7 +15747,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15739,38 +15762,28 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate" + "@value": "Something that acts as or causes Component Failure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:6 L:2)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L6", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "Component Failure" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "0.61,xsd:decimal" + "@language": "en", + "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -15779,7 +15792,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15791,20 +15804,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High" + "@value": "Risks and issues that affect or have the potential to affect society at large or specific groups in society" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:5 L:6)" + "@value": "Societal Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S1L3", + "@id": "https://w3id.org/dpv/risk/owl#HighRisk", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -15816,12 +15829,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.33,xsd:decimal" + "@value": "0.75,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15831,7 +15844,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15843,43 +15862,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" + "@value": "Level where Risk is High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM3x3 S:1 L:3)" + "@value": "High Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#HumanErrors", + "@id": "https://w3id.org/dpv/risk/owl#EnvironmentalIncident", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N7d9296887d1d4b6ea986d2ad6579a1ec" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15889,7 +15897,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15901,37 +15909,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Human Errors" + "@value": "Incident caused due to environmental factors outside human controls" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Human Errors" - } - ] - }, - { - "@id": "_:N7d9296887d1d4b6ea986d2ad6579a1ec", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Environmental Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L4", + "@id": "https://w3id.org/dpv/risk/owl#MonitorRiskSource", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -15942,12 +15934,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.32,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15957,7 +15944,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15969,37 +15956,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" + "@value": "Control that monitors a Risk Source" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:2 L:4)" + "@value": "Monitor Risk Source" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L5", + "@id": "https://w3id.org/dpv/risk/owl#Threat", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.99,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16009,7 +15985,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskSource" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16021,20 +15997,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High" + "@value": "Risk source event which causes Risk" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:5 L:5)" + "@value": "Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl", + "@id": "https://w3id.org/dpv/risk/owl#IdentificationControl", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ @@ -16043,11 +16020,6 @@ "@value": "2024-05-19" } ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples/owl#E0071" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -16055,7 +16027,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskMitigationMeasure" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16067,21 +16039,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that modifies risk" + "@value": "Control to identify characteristics of event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Control" + "@value": "Identification Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S1L2", + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16095,11 +16067,6 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.22,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -16107,7 +16074,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16119,21 +16086,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low" + "@value": "A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM3x3 S:1 L:2)" + "@value": "Risk Matrix 3x3" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L3", + "@id": "https://w3id.org/dpv/risk/owl#IncidentRegister", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16144,12 +16110,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.31,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16159,7 +16120,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/owl#RecordsOfActivities" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16171,21 +16132,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + "@value": "A register recording incidentes, their reports, notifications, and other related activities" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:5 L:3)" + "@value": "Incident Register" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L7", + "@id": "https://w3id.org/dpv/risk/owl#UnwantedCodeDeletion", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16199,9 +16160,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.29,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N9b03e23aa8864f4288a1885778e3b1e4" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16211,7 +16178,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16223,18 +16196,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate" + "@value": "Something that acts as or causes Unwanted Code Deletion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:2 L:7)" + "@value": "Unwanted Code Deletion" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccountCredentials", + "@id": "_:N9b03e23aa8864f4288a1885778e3b1e4", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#CopyrightViolation", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -16259,7 +16248,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nf877665a169e4a7eac29964fc15db245" + "@id": "_:N3984b17b1694455793b94c3ad850178d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16269,7 +16258,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16281,18 +16270,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Account Credentials to be compromised" + "@value": "Something that acts as or causes Copyright Violation" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account Credentials" + "@value": "Copyright Violation" } ] }, { - "@id": "_:Nf877665a169e4a7eac29964fc15db245", + "@id": "_:N3984b17b1694455793b94c3ad850178d", "@type": [ "https://schema.org/WebPage" ], @@ -16308,10 +16297,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentTerminated", + "@id": "https://w3id.org/dpv/risk/owl#Scam", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#IncidentStatus", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16322,44 +16311,19 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" + "@value": "2022-08-17" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "Incident Terminated" + "@id": "_:Nea270aca30b44f5a8cfda049ee8bf631" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -16368,7 +16332,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16380,21 +16347,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that affect or have the potential to affect society at large or specific groups in society" + "@value": "Something that acts as or causes Scam" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Societal Risk" + "@value": "Scam" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L1", + "@id": "_:Nea270aca30b44f5a8cfda049ee8bf631", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#PhysicalAssault", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16408,9 +16391,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.12,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6b8cf1ee50ba4ea081a101b53baf3bb3" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16420,7 +16409,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16432,21 +16421,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low" + "@value": "Something that acts as or causes Physical Assault" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:6 L:1)" + "@value": "Physical Assault" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnwantedCodeDeletion", + "@id": "_:N6b8cf1ee50ba4ea081a101b53baf3bb3", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#PublicOrderBreach", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16468,7 +16473,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nef681cfae64c43969ff8ef7fdde7753a" + "@id": "_:N1d102af8ecd94ce3a875a9a2a7e78bcc" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16478,7 +16483,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16490,37 +16495,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Code Deletion" + "@value": "Something that acts as or causes Public Order Breach" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Code Deletion" + "@value": "Public Order Breach" } ] }, { - "@id": "_:Nef681cfae64c43969ff8ef7fdde7753a", + "@id": "_:N1d102af8ecd94ce3a875a9a2a7e78bcc", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeAccess", + "@id": "https://w3id.org/dpv/risk/owl#RiskAnalysis", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16531,18 +16535,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-18" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N8193907d23bd43dc8b146573989b8a0d" + "@id": "_:N943b082c5ba64ab4896c25d1bccf20cd" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16552,7 +16550,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16564,42 +16562,48 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Access" + "@value": "A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Access" + "@value": "Risk Analysis" } ] }, { - "@id": "_:N8193907d23bd43dc8b146573989b8a0d", + "@id": "_:N943b082c5ba64ab4896c25d1bccf20cd", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "IEC 31010:2019" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.iso.org/standard/72140.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport", + "@id": "https://w3id.org/dpv/risk/owl#IncidentConcluded", "@type": [ + "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16609,7 +16613,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RecordsOfActivities" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16621,21 +16625,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Documented information about an incident, its handling, assessments,and notifications" + "@value": "The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Report" + "@value": "Incident Concluded" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExposureToHarmfulSpeech", + "@id": "https://w3id.org/dpv/risk/owl#ReduceSeverity", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16646,18 +16650,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Ne595b225e5ee4cc2b2374256ef05fa2e" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16667,7 +16660,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ReductionControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16679,48 +16672,89 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Harmful Speech" + "@value": "Control that reduces the severity of an event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Exposure to Harmful Speech" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0" + "@value": "Reduce Severity" } ] }, { - "@id": "_:Ne595b225e5ee4cc2b2374256ef05fa2e", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L5", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.60,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Very High Risk (RM5x5 S:3 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#EnvironmentalIncident", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L3", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.37,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16730,7 +16764,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16742,21 +16776,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident caused due to environmental factors outside human controls" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Environmental Incident" + "@value": "High Risk (RM7x7 S:6 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseGoodwill", + "@id": "https://w3id.org/dpv/risk/owl#IncidentTerminated", "@type": [ + "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16767,18 +16801,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N4f8237833a8141b2bb3c31cf5176bf42" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16788,7 +16811,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16800,36 +16823,62 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Goodwill" + "@value": "The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Goodwill" + "@value": "Incident Terminated" } ] }, { - "@id": "_:N4f8237833a8141b2bb3c31cf5176bf42", + "@id": "https://w3id.org/dpv/risk/owl#DetectionControl", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/created": [ { - "@value": "ISO/IEC 27005:2018" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Control to detect event" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "Detection Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExtremelyHighRisk", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L3", "@type": [ - "https://w3id.org/dpv/owl#RiskLevel", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -16841,12 +16890,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.99,xsd:decimal" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16856,7 +16905,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16868,29 +16917,28 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Extremely High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" + "@value": "Moderate Risk (RM7x7 S:4 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityBreach", + "@id": "https://w3id.org/dpv/risk/owl#IncidentIdentifier", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -16898,7 +16946,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#DataBreach" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16906,18 +16954,41 @@ "@language": "en", "@value": "accepted" } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Identifier associated with an incident" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Incident Identifier" + } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentPreliminaryReport", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L6", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16927,7 +16998,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16939,18 +17010,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Preliminary Report" + "@value": "Moderate Risk (RM7x7 S:2 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataModification", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -16964,7 +17035,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -16973,6 +17044,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nb76ee4ad00614561b02ea8b1fd3da77c" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -16980,7 +17056,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16992,27 +17071,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Non-Material Damage" + "@value": "Something that acts as or causes Unauthorised Data Modification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Non-Material Damage" + "@value": "Unauthorised Data Modification" } + ] + }, + { + "@id": "_:Nb76ee4ad00614561b02ea8b1fd3da77c", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L4", + "@id": "https://w3id.org/dpv/risk/owl#ConsequenceControl", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -17023,12 +17112,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.48,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17038,7 +17122,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17050,23 +17134,28 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + "@value": "Risk Mitigation Measure that controls the Consequences" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:3 L:4)" + "@value": "Consequence Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#EnvironmentalRisk", + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -17074,7 +17163,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/owl#RecordsOfActivities" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17086,21 +17175,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that have their origin in environment or can affect the environment at large" + "@value": "Documented information about an incident, its handling, assessments,and notifications" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Environmental Risk" + "@value": "Incident Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L4", + "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -17111,12 +17200,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-30" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.08,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17126,7 +17216,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17138,22 +17228,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low" + "@value": "Something that acts as or causes Non-Material Damage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:1 L:4)" + "@value": "Non-Material Damage" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability", + "@id": "https://w3id.org/dpv/risk/owl#IncidentNearMiss", "@type": [ + "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", @@ -17167,7 +17269,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17179,18 +17281,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk" + "@value": "The state where an incident was almost successful in taking place i.e. \"it came very close\"" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Vulnerability" + "@value": "Incident Near Miss" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L2", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L7", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -17209,7 +17311,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.24,xsd:decimal" + "@value": "0.71,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17219,7 +17321,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17231,26 +17333,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:3 L:2)" + "@value": "Extremely High Risk (RM7x7 S:5 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentIdentifier", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L4", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.49,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17260,7 +17373,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17272,18 +17385,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Identifier associated with an incident" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Identifier" + "@value": "Very High Risk (RM7x7 S:6 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L1", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L2", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -17302,7 +17415,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.08,xsd:decimal" + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17312,7 +17425,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17324,38 +17437,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:2 L:1)" + "@value": "Low Risk (RM7x7 S:5 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Misuse", + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Delaram Golpayegani" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-06-11" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-17" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17365,7 +17472,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17377,28 +17484,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Misuse" + "@value": "A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Misuse" + "@value": "Risk Matrix 7x7" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AccidentalIncident", + "@id": "https://w3id.org/dpv/risk/owl#UserRisks", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -17406,7 +17508,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17418,18 +17520,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident caused due to accidental actions arising from human or human-controlled situations" + "@value": "Concepts associated with risks that arise due to User or Human use" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Accidental Incident" + "@value": "User Risks" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L7", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L4", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -17448,7 +17550,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.86,xsd:decimal" + "@value": "0.80,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17458,7 +17560,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17470,13 +17572,13 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:6 L:7)" + "@value": "Very High Risk (RM5x5 S:5 L:4)" } ] } diff --git a/2.1-dev/risk/risk-owl.n3 b/2.1-dev/risk/risk-owl.n3 index f2342f89c..b6e848bba 100644 --- a/2.1-dev/risk/risk-owl.n3 +++ b/2.1-dev/risk/risk-owl.n3 @@ -143,7 +143,9 @@ risk-owl:AuthorisationFailure a rdfs:Class, schema:name "ENISa Trust Services Security Incidents 2021" ; schema:url "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Authorisation Failure"@en ; skos:prefLabel "Authorisation Failure"@en . @@ -152,7 +154,8 @@ risk-owl:AvailabilityBreach a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:DataBreach ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:DataBreach ; sw:term_status "accepted"@en . risk-owl:AvailabilityIncident a rdfs:Class, @@ -197,7 +200,8 @@ risk-owl:Blackmail a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Blackmail"@en ; skos:prefLabel "Blackmail"@en . @@ -212,7 +216,9 @@ risk-owl:BruteForceAuthorisations a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; skos:prefLabel "Brute Force Authorisations"@en . @@ -249,7 +255,8 @@ risk-owl:Coercion a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Coercion"@en ; skos:prefLabel "Coercion"@en . @@ -270,7 +277,8 @@ risk-owl:ComponentFailure a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Component Failure"@en ; skos:prefLabel "Component Failure"@en ; @@ -280,7 +288,8 @@ risk-owl:ComponentMalfunction a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Component Malfunction"@en ; skos:prefLabel "Component Malfunction"@en ; @@ -296,7 +305,10 @@ risk-owl:CompromiseAccount a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ; skos:prefLabel "Compromise Account"@en . @@ -311,7 +323,8 @@ risk-owl:CompromiseAccountCredentials a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ; skos:prefLabel "Compromise Account Credentials"@en . @@ -326,7 +339,8 @@ risk-owl:ConfidentialityBreach a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:DataBreach ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:DataBreach ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Confidentiality Breach"@en ; skos:prefLabel "Confidentiality Breach"@en . @@ -395,7 +409,8 @@ risk-owl:Cryptojacking a rdfs:Class, schema:name "ENISA Threat Landscape 2021" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Cryptojacking"@en ; skos:prefLabel "Cryptojacking"@en . @@ -424,7 +439,10 @@ risk-owl:DataBreach a rdfs:Class, vann:example dex-owl:E0069, dex-owl:E0071 ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SecurityBreach ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:SecurityBreach ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Data Breach"@en ; skos:prefLabel "Data Breach"@en . @@ -439,7 +457,8 @@ risk-owl:DataCorruption a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:IntegrityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Corruption of Data"@en ; skos:prefLabel "Data Corruption"@en ; @@ -461,13 +480,11 @@ risk-owl:DenialServiceAttack a rdfs:Class, dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ], - [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ; skos:prefLabel "Denial of Service Attack (DoS)"@en . @@ -516,7 +533,8 @@ risk-owl:DistributedDenialServiceAttack a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ; skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en . @@ -549,7 +567,8 @@ risk-owl:EquipmentFailure a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Equipment Failure"@en ; skos:prefLabel "Equipment Failure"@en ; @@ -565,7 +584,8 @@ risk-owl:EquipmentMalfunction a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Equipment Malfunction"@en ; skos:prefLabel "Equipment Malfunction"@en ; @@ -621,7 +641,8 @@ risk-owl:Extorsion a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Extorsion"@en ; skos:prefLabel "Extorsion"@en . @@ -751,7 +772,8 @@ risk-owl:Fraud a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Fraud"@en ; skos:prefLabel "Fraud"@en . @@ -860,7 +882,8 @@ risk-owl:IdentityFraud a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Identity Fraud"@en ; skos:prefLabel "Identity Fraud"@en . @@ -875,7 +898,8 @@ risk-owl:IdentityTheft a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Identity Theft"@en ; skos:prefLabel "Identity Theft"@en . @@ -1175,7 +1199,8 @@ risk-owl:IntegrityBreach a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:DataBreach ; + rdfs:subClassOf risk-owl:DataBreach, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en . risk-owl:IntegrityIncident a rdfs:Class, @@ -1206,21 +1231,13 @@ risk-owl:InterceptCommunications a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Interception of Communications"@en ; skos:prefLabel "Intercept Communications"@en ; skos:scopeNote "This concept was called \"InterceptionCommunications\" in DPV 2.0"@en . -risk-owl:InternalSecurityThreat a rdfs:Class, - owl:Class, - dpv-owl:RiskConcept ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:RiskConcept ; - sw:term_status "accepted"@en ; - skos:definition "Concepts associated with security threats and issues that originate within the organisation"@en ; - skos:prefLabel "Internal Security Threat"@en . - risk-owl:JudicialCosts a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; @@ -1408,7 +1425,10 @@ risk-owl:MaliciousCodeAttack a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Malicious Code Attack"@en ; skos:prefLabel "Malicious Code Attack"@en . @@ -1423,7 +1443,10 @@ risk-owl:MalwareAttack a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Malware Attack"@en ; skos:prefLabel "Malware Attack"@en . @@ -1635,7 +1658,8 @@ risk-owl:PhishingScam a rdfs:Class, schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Phishing Scam"@en ; skos:prefLabel "Phishing Scam"@en . @@ -2746,7 +2770,8 @@ risk-owl:Reidentification a rdfs:Class, dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Re-identification"@en ; skos:prefLabel "Re-identification"@en ; @@ -2994,7 +3019,9 @@ risk-owl:Sabotage a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Sabotage"@en ; skos:prefLabel "Sabotage"@en . @@ -3009,7 +3036,8 @@ risk-owl:Scam a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Scam"@en ; skos:prefLabel "Scam"@en . @@ -3018,7 +3046,10 @@ risk-owl:SecurityAttack a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ; skos:prefLabel "Security Attack"@en . @@ -3033,7 +3064,10 @@ risk-owl:SecurityBreach a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Security Breach"@en ; skos:prefLabel "Security Breach"@en . @@ -3117,7 +3151,9 @@ risk-owl:Spoofing a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat, + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept, risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Spoofing"@en ; @@ -3133,7 +3169,8 @@ risk-owl:SystemFailure a rdfs:Class, schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes System Failure"@en ; skos:prefLabel "System Failure"@en ; @@ -3149,7 +3186,10 @@ risk-owl:SystemIntrusion a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes System Intrusion"@en ; skos:prefLabel "System Intrusion"@en . @@ -3164,7 +3204,8 @@ risk-owl:SystemMalfunction a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes System Malfunction"@en ; skos:prefLabel "System Malfunction"@en ; @@ -3213,7 +3254,10 @@ risk-owl:UnauthorisedAccesstoPremises a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ; skos:prefLabel "Unauthorised Access to Premises"@en . @@ -3222,7 +3266,10 @@ risk-owl:UnauthorisedActivity a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Activity"@en ; skos:prefLabel "Unauthorised Activity"@en . @@ -3237,7 +3284,9 @@ risk-owl:UnauthorisedCodeAccess a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Code Access"@en ; skos:prefLabel "Unauthorised Code Access"@en . @@ -3252,7 +3301,8 @@ risk-owl:UnauthorisedCodeDisclosure a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ; skos:prefLabel "Unauthorised Code Disclosure"@en . @@ -3267,7 +3317,8 @@ risk-owl:UnauthorisedCodeModification a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ; skos:prefLabel "Unauthorised Code Modification"@en . @@ -3282,7 +3333,8 @@ risk-owl:UnauthorisedDataAccess a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Data Access"@en ; skos:prefLabel "Unauthorised Data Access"@en . @@ -3297,7 +3349,8 @@ risk-owl:UnauthorisedDataDisclosure a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ; skos:prefLabel "Unauthorised Data Disclosure"@en . @@ -3312,7 +3365,8 @@ risk-owl:UnauthorisedDataModification a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ; skos:prefLabel "Unauthorised Data Modification"@en . @@ -3327,7 +3381,8 @@ risk-owl:UnauthorisedInformationDisclosure a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ; skos:prefLabel "Unauthorised Information Disclosure"@en . @@ -3339,7 +3394,8 @@ risk-owl:UnauthorisedReidentification a rdfs:Class, dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ; skos:prefLabel "Unauthorised Re-Identification"@en . @@ -3354,7 +3410,8 @@ risk-owl:UnauthorisedResourceUse a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ; skos:prefLabel "Unauthorised Resource Use"@en . @@ -3369,7 +3426,9 @@ risk-owl:UnauthorisedSystemAccess a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised System Access"@en ; skos:prefLabel "Unauthorised System Access"@en . @@ -3384,7 +3443,8 @@ risk-owl:UnauthorisedSystemModification a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised System Modification"@en ; skos:prefLabel "Unauthorised System Modification"@en . @@ -3399,7 +3459,9 @@ risk-owl:UnwantedCodeDeletion a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ; skos:prefLabel "Unwanted Code Deletion"@en . @@ -3414,7 +3476,9 @@ risk-owl:UnwantedDataDeletion a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ; skos:prefLabel "Unwanted Data Deletion"@en . @@ -3429,7 +3493,8 @@ risk-owl:UnwantedDisclosureData a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ; skos:prefLabel "Unwanted Disclosure of Data"@en . @@ -3641,21 +3706,6 @@ risk-owl:Vulnerability a rdfs:Class, skos:definition "Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk"@en ; skos:prefLabel "Vulnerability"@en . -risk-owl:VulnerabilityCreated a rdfs:Class, - owl:Class, - dpv-owl:RiskConcept ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:modified "2024-08-16"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:InternalSecurityThreat ; - sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Vulnerability Created"@en ; - skos:prefLabel "Vulnerability Created"@en . - risk-owl:causedByThreat a rdf:Property, owl:ObjectProperty ; dcam:rangeIncludes risk-owl:Threat ; diff --git a/2.1-dev/risk/risk-owl.rdf b/2.1-dev/risk/risk-owl.rdf index f2370943c..021836291 100644 --- a/2.1-dev/risk/risk-owl.rdf +++ b/2.1-dev/risk/risk-owl.rdf @@ -13,4415 +13,4457 @@ xmlns:sw="http://www.w3.org/2003/06/sw-vocab-status/ns#" xmlns:vann="http://purl.org/vocab/vann/" > - - Very High Risk - Level where Risk is Very High - The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 - - 0.9,xsd:decimal + + 0.67,xsd:decimal - + - Harshvardhan J. Pandit + 2022-08-17 + High Risk (RM3x3 S:2 L:3) accepted - 2022-08-18 - - - - - - - + Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - Reduction Control - accepted - 2024-05-19 - Control that reduces the likelihood or severity of an event - + Harshvardhan J. Pandit + - + + 2024-08-16 + Exposure to Harmful Speech 2022-08-17 + accepted - 2024-08-16 - Something that acts as or causes Loss of Negotiating Capacity - - Harshvardhan J. Pandit + This concept was called "HarmfulSpeech" in DPV 2.0 - Lose of Negotiating Capacity - + Harshvardhan J. Pandit + Something that acts as or causes Harmful Speech + - + + + Harshvardhan J. Pandit + - - Georg P. Krog, Harshvardhan J. Pandit - Something that acts as or provides compensation - which can be monetary and financial or in other forms - 2024-08-16 - Compensation - - 2024-04-14 + Risk Mitigation Measure that controls the Consequences + Consequence Control + 2024-05-19 accepted - + - - + + 0.24,xsd:decimal + accepted + - Harshvardhan J. Pandit - accepted - Risk Matrix 7x7 + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate + Moderate Risk (RM7x7 S:6 L:2) + Harshvardhan J. Pandit 2022-08-17 - A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types - - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 - + - + Harshvardhan J. Pandit - - - 2024-02-14 - The status of a incident is unknown - accepted - Incident Status Unknown - - - - Violation of Rights - - Something that acts as or causes Violation of Rights - - accepted - Georg P. Krog, Harshvardhan J. Pandit - 2022-08-18 2024-08-16 - This concept was called "ViolationOfRights" in DPV 2.0 - + 2022-08-17 + + Something that acts as or causes Physical Assault + accepted + Physical Assault + - - 0.5,xsd:decimal - - - + + 0.16,xsd:decimal + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low Harshvardhan J. Pandit - accepted - Moderate Severity - Level where Severity is Moderate - 2022-08-18 - The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 - - - - - - Very High Risk (RM7x7 S:6 L:4) - - Harshvardhan J. Pandit - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High - 0.49,xsd:decimal 2022-08-17 accepted - + Low Risk (RM5x5 S:1 L:4) + - - - Indicates the associated context (subject) is caused by the indicated vulnerability (object) - 2024-02-14 + + + + + refers to risk - + accepted - caused by vulnerability - + 2024-02-14 + Indicates the incident (subject) is a materialisation of the indicated risk (object) + + - - Harshvardhan J. Pandit + + Extremely Low Likelihood accepted - 2024-05-19 - Control that reduces the likelihood of an event + 0.01,xsd:decimal + Level where Likelihood is Extremely Low + - - Reduce Likelihood + The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 - + Harshvardhan J. Pandit + 2022-08-18 + - + + 2024-08-16 + Lose of Negotiating Capacity + + + + 2022-08-17 + accepted + Something that acts as or causes Loss of Negotiating Capacity Harshvardhan J. Pandit + + + + + 2024-08-16 - + + Re-identification + Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification accepted - The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 - High Severity - 2022-08-18 - 0.75,xsd:decimal - Level where Severity is High - - - - - - 3 Severity Levels + 2022-08-19 + Harshvardhan J. Pandit - 2022-08-18 - + Something that acts as or causes Re-identification + + + + + 2024-05-19 - Scale with 3 Severity Levels from High to Low - + + Incident Notice accepted - - - + Notice associated with an Incident - Very Low Risk (RM7x7 S:6 L:1) - 0.12,xsd:decimal - accepted + + + High Risk (RM7x7 S:4 L:5) + Harshvardhan J. Pandit + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High + 0.41,xsd:decimal 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low + accepted - - accepted + - + 2022-08-17 - - Something that acts as or causes Unauthorised Code Modification - 2024-08-16 - Unauthorised Code Modification + 0.22,xsd:decimal + accepted Harshvardhan J. Pandit - + Low Risk (RM3x3 S:2 L:1) + Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low + - - Illegal Data Processing - 2024-08-16 - Something that acts as or causes Illegal Processing of Data - This concept was called "IllegalProcessingData" in DPV 2.0 - Harshvardhan J. Pandit + + Risks and issues that affect the reputation of the organisation + + + accepted + Reputational Risk + + + + Something that acts as or causes Unauthorised Data Disclosure + 2024-08-16 - + accepted + Harshvardhan J. Pandit + Unauthorised Data Disclosure 2022-08-17 - + + + + - - Risk Mitigation Measure that controls Impacts - + + + Here equipment refers to physical equipment - Impact Control Harshvardhan J. Pandit + Something that acts as or causes Equipment Failure + 2024-08-16 + 2022-08-17 + Equipment Failure accepted - 2024-05-19 - - - - https://www.iso.org/standard/72140.html - IEC 31010:2019 - + + + - + + Harshvardhan J. Pandit + 2022-08-18 + Level where Severity is Very Low + Very Low Severity + - - Remedy Control - Control to remedy consequences of event + The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 accepted - 2024-05-19 - - - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 + 0.1,xsd:decimal + + - - Something that acts as or causes System Malfunction - 2024-08-16 - Here system refers to both hardware and software systems - Harshvardhan J. Pandit - accepted + + Unauthorised Re-Identification - + Georg P. Krog + 2022-08-19 - 2022-08-17 - System Malfunction - + 2024-08-16 + Something that acts as or causes Unauthorised Re-Identification + accepted + + - - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High - High Risk (RM7x7 S:5 L:4) - - + + Something that acts as or causes Component Failure + - 0.41,xsd:decimal - Harshvardhan J. Pandit + Component Failure accepted - 2022-08-17 - + Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of + + + - - 2024-08-16 + + - - modified + High Severity + 0.75,xsd:decimal + accepted + Level where Severity is High + The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 Harshvardhan J. Pandit - - 2022-08-17 - Violation of Legal Obligations - Something that acts as or causes Violation of Legal Obligations - This concept was called "ViolationRegulatoryObligations" in DPV 2.0 - + 2022-08-18 + + + - - - Extremely High Risk (RM7x7 S:6 L:7) + + Moderate Risk accepted - - - + Level where Risk is Moderate + The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 + Harshvardhan J. Pandit - 2022-08-17 - 0.86,xsd:decimal - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High - - - + - - Level where Likelihood is Extremely Low - Extremely Low Likelihood 2022-08-18 - - 0.01,xsd:decimal - The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 - Harshvardhan J. Pandit - accepted - + 0.5,xsd:decimal + + + - + + Harshvardhan J. Pandit + Compromise Account + Something that acts as or causes a compromised account that is then used by the compromiser + 2024-08-16 - Harshvardhan J. Pandit - - - Spoofing 2022-08-17 - Something that acts as or causes Spoofing accepted - 2024-08-16 - + + + + - + + Harshvardhan J. Pandit + 2022-08-17 + Something that acts as or causes Account Credentials to be compromised - + + Compromise Account Credentials + 2024-08-16 accepted - 2024-05-19 - Control that removes the risk source - Remove Source + - Harshvardhan J. Pandit - - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 - + + - - Incident Suspected - - accepted - + + Control that avoids the risk source + 2024-05-19 + Avoid Source + + accepted + Harshvardhan J. Pandit - The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing - 2024-02-14 - + - - - - Incident Concluding Report + + Harshvardhan J. Pandit + Psychological Harm + 2022-08-17 + accepted - 2024-05-19 - A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known + + 2024-08-16 + + Something that acts as or causes Psychological Harm + - - + + + 2024-08-16 + accepted Harshvardhan J. Pandit - Something that acts as or causes Unauthorised Code Disclosure + Authorisation Failure + Something that acts as or causes Authorisation Failure + 2022-08-17 - - Unauthorised Code Disclosure - 2024-08-16 - accepted - - - - ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html + + + - - accepted - - - - Risk Mitigation Measure that controls the Source - 2024-05-19 - Source Control + Harshvardhan J. Pandit - - - + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High 2022-08-17 - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low - 0.08,xsd:decimal - + Very High Risk (RM7x7 S:5 L:5) + - Harshvardhan J. Pandit accepted - Very Low Risk (RM5x5 S:2 L:1) - - + 0.51,xsd:decimal + - + + Control that reduces the likelihood of an event + Reduce Likelihood + + Harshvardhan J. Pandit + 2024-05-19 + + + accepted - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low - 2022-08-17 - Very Low Risk (RM7x7 S:2 L:3) + + + + 2022-08-17 + accepted + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High + 0.40,xsd:decimal Harshvardhan J. Pandit - 0.12,xsd:decimal - + High Risk (RM5x5 S:5 L:2) + - + + 2024-02-14 + + + + has risk source + + + Indicates the risk (subject) has the indicated risk source (object) + accepted - The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring - - - - 2024-02-14 - Incident Mitigated - Harshvardhan J. Pandit - - - - - - - - Moderate Risk (RM7x7 S:7 L:2) - accepted - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate - Harshvardhan J. Pandit - 2022-08-17 - 0.29,xsd:decimal - - - Harshvardhan J. Pandit + + accepted - 2022-08-17 - - - - Very High Risk (RM5x5 S:3 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High - - 0.60,xsd:decimal - - - - 2024-08-16 - Something that acts as or causes Unauthorised Access to Premises - Harshvardhan J. Pandit - accepted - 2022-08-17 - Unauthorised Access to Premises + Something that acts as or causes Equipment Malfunction - - - - Delaram Golpayegani + Here equipment refers to physical equipment + 2022-08-17 + Equipment Malfunction 2024-08-16 - Misuse + + + + - Something that acts as or causes Misuse + Harshvardhan J. Pandit + 2022-08-17 + Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques + 2024-08-16 + + Brute Force Authorisations accepted - 2024-06-11 - + + + - - accepted - + - 2024-06-12 - Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk - Risk Management - ISO 31073:2022 Risk management vocabulary - + + Risks and issues that affect or have the potential to affect specific individuals + accepted + Individual Risk - + + 0.02,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low Harshvardhan J. Pandit + Extremely Low Risk (RM7x7 S:1 L:1) + accepted 2022-08-17 - 0.04,xsd:decimal - Extremely Low Risk (RM7x7 S:2 L:1) - - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - - + + Financial Loss + Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity - Lose of Customer Confidence - accepted + Harshvardhan J. Pandit 2022-08-17 - Something that acts as or causes Loss of Customer Confidence + - Harshvardhan J. Pandit 2024-08-16 - - - - Something that acts as or causes Identity Theft - Harshvardhan J. Pandit - Identity Theft accepted - + + + + + accepted + Extremely High Risk (RM7x7 S:7 L:5) - - 2024-08-16 - 2022-08-17 - - - Harshvardhan J. Pandit - 2024-08-16 + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High 2022-08-17 - This concept was called "ChildViolence" in DPV 2.0 - - - - - Violence against children - - Something that acts as or causes Child Violence - accepted - + 0.71,xsd:decimal + - + - Very Low Risk (RM5x5 S:1 L:3) - + Harshvardhan J. Pandit + 2024-05-19 + Risk Mitigation Measure that controls the Source + - Harshvardhan J. Pandit accepted - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low - 2022-08-17 - 0.12,xsd:decimal - + Source Control + - - Low Risk (RM7x7 S:4 L:2) + + ENISA Reference Incident Classification Taxonomy 2018 + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + accepted - + - Harshvardhan J. Pandit - - 0.16,xsd:decimal + Extremely Low Risk (RM7x7 S:1 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low + 0.04,xsd:decimal 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low + + Harshvardhan J. Pandit - - + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - - 2024-02-14 - has control - - Indicates the use of specified control - - - accepted - - - - Harshvardhan J. Pandit - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High - 0.99,xsd:decimal - + + Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate + + Moderate Risk (RM3x3 S:2 L:2) - accepted + Harshvardhan J. Pandit + 0.44,xsd:decimal 2022-08-17 - Extremely High Risk (RM7x7 S:7 L:7) - - - accepted - Indicates an incident is associated with the specified context - - - - has incident - - - 2024-02-14 + - + + + 2022-08-18 - Harshvardhan J. Pandit + Something that acts as or causes Limitation of Rights 2024-08-16 - Terrorism - - Something that acts as or causes Terrorism - + Limitation of Rights + This concept was called "LimitationOfRights" in DPV 2.0 accepted - 2022-08-17 + Georg P. Krog, Harshvardhan J. Pandit - - - https://www.iso.org/standard/72140.html - IEC 31010:2019 - - - Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High - + + Extremely Low Risk (RM7x7 S:2 L:2) + accepted + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low + 0.08,xsd:decimal + Harshvardhan J. Pandit 2022-08-17 - 0.67,xsd:decimal - High Risk (RM3x3 S:3 L:2) - - + - - Incident Impact Assessment - Harshvardhan J. Pandit - 2024-05-19 - + + - An impact assessment associated with a incident + Something that acts as or causes Misuse + 2024-08-16 + Delaram Golpayegani + 2024-06-11 accepted + Misuse + - - - - refers to risk - - - - - Indicates the incident (subject) is a materialisation of the indicated risk (object) - 2024-02-14 - + accepted - - - - - - - Availability Incident - 2024-05-19 - Incident where the availability of information or system has been affected - accepted - - - - An actual or occured event - - - - 2024-08-16 + Something that acts as or causes Malicious Code Attack - Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez - 2024-02-14 - 2024-05-19 - accepted - Incident - Incident is realised or materialised risk + Harshvardhan J. Pandit + Malicious Code Attack + 2022-08-17 + + + + + + - - 2024-08-16 - - System Failure - Harshvardhan J. Pandit - accepted - + + + Something that acts as or causes Scam + 2024-08-16 2022-08-17 - Here system refers to both hardware and software systems - Something that acts as or causes System Failure - - - - - - Axel Polleres - Rob Brennan - Julian Flake - Fajar Ekaputra - Beatriz Esteves - Julio Fernandez - Delaram Golpayegani - Georg P. Krog + accepted + Scam + + Harshvardhan J. Pandit - Delaram Golpayegani - Beatriz Esteves - Julian Flake - Rob Brennan - Harshvardhan J. Pandit - Paul Ryan - Georg P. Krog - https://w3id.org/dpv/risk - 2.1-dev - https://w3id.org/dpv/risk# - - - - - 2024-07-13 - 2022-08-14 - Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management - - - - - - - - - 2.1-dev - 10.5281/zenodo.12505841 - - http://www.w3.org/2004/02/skos/core - - http://www.w3.org/2000/01/rdf-schema - Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 - - - - 2022-08-14 - http://purl.org/ontology/bibo/status/published - RISK - Risk Concepts - - - risk + + - - - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate + + ENISa Trust Services Security Incidents 2021 + https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 + + + accepted - 0.24,xsd:decimal - - - 2022-08-17 + Something that acts as or causes Security Breach + Security Breach Harshvardhan J. Pandit - Moderate Risk (RM7x7 S:4 L:3) - - - - Something that acts as or causes Component Failure - Component Failure - accepted - Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of + + 2024-08-16 + + + - - https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 - - - + + Detriment + - Georg P. Krog, Harshvardhan J. Pandit - 2022-08-18 + 2022-03-23 + accepted + + Something that acts as or causes Detriment + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves 2024-08-16 - This concept was called "PreventExercisingOfRights" in DPV 2.0 - Something that acts as or causes Prevent Exercising of Rights + + + + + + - Prevent Exercising of Rights + 2024-08-16 + Georg P. Krog + Social Disadvantage + Something that acts as or causes Social Disadvantage accepted + 2022-08-19 - - Something that acts as or causes Erroneous System Use + 2022-08-17 - Erroneous System Use + Moderate Risk (RM7x7 S:5 L:3) + accepted + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate + - - Harshvardhan J. Pandit - - 2024-08-16 + 0.31,xsd:decimal - accepted - + Harshvardhan J. Pandit + - + - + - 2024-02-14 + 0.04,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low + 2022-08-17 + Extremely Low Risk (RM7x7 S:2 L:1) accepted - Harshvardhan J. Pandit - Incident Near Miss - The state where an incident was almost successful in taking place i.e. "it came very close" - + Harshvardhan J. Pandit + - - Moderate Risk (RM5x5 S:3 L:2) - + + + - - 0.24,xsd:decimal + accepted + 2024-08-16 + Unwanted Code Deletion Harshvardhan J. Pandit + Something that acts as or causes Unwanted Code Deletion + 2022-08-17 - accepted - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate - + + + - + + Harshvardhan J. Pandit - accepted - Scale with 5 Risk Levels from Very High to Very Low 2022-08-18 - 5 Risk Levels + accepted + Scale with 5 Risk Levels from Very High to Very Low - - + + 2022-08-17 + 0.12,xsd:decimal + Very Low Risk (RM7x7 S:3 L:2) + + accepted + Harshvardhan J. Pandit - 2022-08-17 - 0.61,xsd:decimal - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low + + + + A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures + Harshvardhan J. Pandit + + + + 2022-08-18 + + Risk Analysis accepted - Extremely High Risk (RM7x7 S:5 L:6) - - - - - is exploited by + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + 2024-02-14 + + - + + + Indicates the threat (subject) has the indicated source (object) + has threat source accepted - 2024-02-14 - - Indicates the vulnerability (subject) is exploited by the indicated threat (object) - - + + - Harshvardhan J. Pandit - Psychological Harm + The criteria for what is considered material damage is based in jurisdictional laws and norms + 2022-03-30 accepted 2024-08-16 - 2022-08-17 - Something that acts as or causes Psychological Harm + Non-Material Damage + Something that acts as or causes Non-Material Damage - - + Harshvardhan J. Pandit + - - 0.11,xsd:decimal - Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - - Low Risk (RM3x3 S:1 L:1) - accepted + - Harshvardhan J. Pandit - 2022-08-17 - - - - - Something that acts as or causes Distributed Denial of Service Attack (DDoS) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low accepted + 2022-08-17 - Distributed Denial of Service Attack (DDoS) + 0.16,xsd:decimal + Low Risk (RM7x7 S:4 L:2) + Harshvardhan J. Pandit + + + + Scale with 5 Likelihood Levels from Very High to Very Low + - + 5 Likelihood Levels + accepted + Harshvardhan J. Pandit - - 2024-08-16 - + 2022-08-18 + - - accepted + + 2022-08-18 + - - Low Risk (RM7x7 S:3 L:3) + 7 Likelihood Levels + accepted + Scale with 7 Likelihood Levels from Extremely High to Extremely Low - 0.18,xsd:decimal - 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low Harshvardhan J. Pandit - + - + + 2022-08-17 + 0.37,xsd:decimal + accepted Harshvardhan J. Pandit - accepted - 0.61,xsd:decimal - Very High Risk (RM7x7 S:6 L:5) - 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High + High Risk (RM7x7 S:6 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High - - https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 - - - 2024-08-16 - 2022-08-17 - Violation of Statutory Obligations - - Harshvardhan J. Pandit + + A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again - This concept was called "ViolationStatutoryObligations" in DPV 2.0 - modified + 2024-05-19 + - - Something that acts as or causes Violation of Statutory Obligations - + Incident Mitigation Measure + accepted - - Very Low Severity + + + + + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High + Extremely High Risk (RM7x7 S:7 L:6) - 0.1,xsd:decimal Harshvardhan J. Pandit + 2022-08-17 accepted - Level where Severity is Very Low - The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 - - - - 2022-08-18 - - + 0.86,xsd:decimal + - + + Something that acts as or causes Unauthorised Code Modification - + 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High - 0.57,xsd:decimal + accepted + 2024-08-16 + Unauthorised Code Modification + - Very High Risk (RM7x7 S:7 L:4) Harshvardhan J. Pandit - accepted - + + - + - Accidental Misuse - Accidental Misuse - + Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk accepted - + Risk Management + + 2024-06-12 + ISO 31073:2022 Risk management vocabulary - + + 2022-08-17 + accepted + - + Something that acts as or causes Identity Theft + Identity Theft Harshvardhan J. Pandit - Reduce Severity - Control that reduces the severity of an event + + 2024-08-16 - accepted - 2024-05-19 - + + - + - + - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low - Low Risk (RM7x7 S:5 L:2) + Extremely High Risk + accepted + The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 Harshvardhan J. Pandit - accepted - 2022-08-17 - 0.20,xsd:decimal - + 2022-08-18 + Level where Risk is Extremely High + 0.99,xsd:decimal + - - - - - - - 2024-02-14 - - has threat source - Indicates the threat (subject) has the indicated source (object) - + + Reduction Control + + + accepted + 2024-05-19 + + Control that reduces the likelihood or severity of an event + - + Harshvardhan J. Pandit - - accepted - Lose of Goodwill + Intercept Communications + This concept was called "InterceptionCommunications" in DPV 2.0 + 2022-08-17 + Something that acts as or causes Interception of Communications + modified - 2022-08-17 - Something that acts as or causes Loss of Goodwill 2024-08-16 - + + + + + + ISO/IEC 27005:2018 + + https://www.iso.org/standard/75281.html 2022-08-17 - Violating Code of Conduct - 2024-08-16 - + 2024-08-16 + This concept was called "ViolationCodeConduct" in DPV 2.0 + Violating Code of Conduct + Something that acts as or causes Violation of Code of Conduct + + modified Harshvardhan J. Pandit - Something that acts as or causes Violation of Code of Conduct - - This concept was called "ViolationCodeConduct" in DPV 2.0 - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - + + + Harshvardhan J. Pandit + Level where Likelihood is Moderate + Moderate Likelihood + 2022-08-18 + - - - - Data Breach - Harshvardhan J. Pandit - Something that acts as or causes Data Breach + 0.5,xsd:decimal accepted - 2024-08-16 - 2022-08-17 - - - + The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 + + + - - The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring + - + + Remove Impact + Control that removes Impact i.e. prevents it from materialising - 2024-02-14 - accepted - Incident Terminated Harshvardhan J. Pandit - - - - modified - 2024-08-16 - Something that acts as or causes Violation of Contractual Obligations - - 2022-08-17 - - - - Harshvardhan J. Pandit - - This concept was called "ViolationContractualObligations" in DPV 2.0 - Violation of Contractual Obligation - + accepted + 2024-05-19 + - + + - - Harshvardhan J. Pandit - 2022-08-18 - 0.25,xsd:decimal - Low Risk - The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 + 0.61,xsd:decimal accepted - Level where Risk is Low - - - - - 2022-08-17 - + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High + Harshvardhan J. Pandit + Extremely High Risk (RM7x7 S:5 L:6) + + + + - Harshvardhan J. Pandit - Something that acts as or causes Personal Safety Endangerment - - Personal Safety Endangerment - 2024-08-16 - + Accidental Misuse accepted - - - - - - 2024-02-14 - - - is vulnerability of - accepted - Indicates the vulnerability (subject) is associated with indicated context (object) + Accidental Misuse + - - - - + + Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other. - Incident Halted Harshvardhan J. Pandit + Risk Matrix + + + + accepted 2024-02-14 - The incident has halted or paused with a high likelihood of resuming or recurring - + - + + 2022-08-17 accepted + + Something that acts as or causes Malware Attack + 2024-08-16 - Harshvardhan J. Pandit - 2022-08-17 - Something that acts as or causes Vulnerability Created - - 2024-08-16 - Vulnerability Created - + Harshvardhan J. Pandit + Malware Attack + + + + - + - A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence - accepted - 2024-05-19 + Harshvardhan J. Pandit + Something that acts as or causes Loss of Reputation + - Incident Handling Report - + 2024-08-16 + 2022-08-17 + accepted + Lose of Reputation + + + Level where Likelihood is Extremely High + The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 Extremely High Likelihood + + Harshvardhan J. Pandit 2022-08-18 0.99,xsd:decimal accepted - Level where Likelihood is Extremely High - - Harshvardhan J. Pandit - The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 - - - accepted - 2024-02-14 - Risk Source + + - The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk - 2024-08-16 + accepted + + - + + accepted + + + + Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of + Something that acts as or causes Component Malfunction + + Component Malfunction + + + + + + + + accepted + Incident Ongoing Harshvardhan J. Pandit + 2024-02-14 + The incident is ongoing i.e. still active + + + accepted - 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High - + 2024-02-14 + + Indicates the threat (subject) exploits the indicated vulnerability (object) + + exploits vulnerability + + + + + + + + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low + - 0.73,xsd:decimal - Extremely High Risk (RM7x7 S:6 L:6) + Harshvardhan J. Pandit + 2022-08-17 + + Very Low Risk (RM7x7 S:2 L:3) + accepted + 0.12,xsd:decimal - - A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known - 2024-05-19 + + - + Control that removes the risk source - Incident Preliminary Report + Remove Source accepted + Harshvardhan J. Pandit + 2024-05-19 + - - + + Something that acts as or causes Sexual Violence + Harshvardhan J. Pandit - 2024-08-16 2022-08-17 - This concept was called "Corruption Data" in DPV 2.0 - - modified - Something that acts as or causes Corruption of Data - Data Corruption - + accepted + 2024-08-16 + + Sexual Violence + - - ENISA Methodology for Sectoral Cybersecurity Assessments + - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - - accepted + + + Something that acts as or causes benefits + 2022-03-23 + - 2024-02-14 - Harshvardhan J. Pandit - - Status associated with an incident - - Incident Status - + accepted + 2024-08-16 + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres + Benefit + - - ENISA Threat Taxonomy 2016 + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - accepted - - - - Harshvardhan J. Pandit - 2022-08-17 - A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types - Risk Matrix 3x3 + - - - - Something that acts as or causes Unauthorised Resource Use - Unauthorised Resource Use - Harshvardhan J. Pandit - 2024-08-16 2022-08-17 - - + Something that acts as or causes Unwanted Disclosure of Data + + Harshvardhan J. Pandit + Unwanted Disclosure of Data accepted + 2024-08-16 + - + + Very High Risk (RM7x7 S:7 L:4) + 2022-08-17 - + - 2024-02-14 accepted - Incident Concluded - The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High Harshvardhan J. Pandit - + 0.57,xsd:decimal + - - - accepted - Very Low Risk (RM7x7 S:1 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low - - - - Harshvardhan J. Pandit + 2022-08-17 - 0.10,xsd:decimal - - - - Very Low Risk (RM5x5 S:1 L:2) - + + + + accepted + 2024-08-16 + Spoofing - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low Harshvardhan J. Pandit - accepted - 2022-08-17 - 0.08,xsd:decimal - + Something that acts as or causes Spoofing + + + + - - Harshvardhan J. Pandit - accepted - 2022-08-17 - 0.20,xsd:decimal - Low Risk (RM7x7 S:2 L:5) + - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low + Harshvardhan J. Pandit + - - + 2022-08-18 + High Risk + Level where Risk is High + The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 + 0.75,xsd:decimal + accepted + + + - - Risks and issues that affect or have the potential to affect specific individuals - Individual Risk + + - + 2024-05-19 accepted + + Harshvardhan J. Pandit + Monitor Impact + Control that monitors a Risk Impact + - + + Something that acts as or causes Distributed Denial of Service Attack (DDoS) + 2024-08-16 - Harshvardhan J. Pandit + Harshvardhan J. Pandit 2022-08-17 - Something that acts as or causes Unauthorised Data Modification - Unauthorised Data Modification - - 2024-08-16 + Distributed Denial of Service Attack (DDoS) accepted + + - + + - - High Likelihood - - 0.75,xsd:decimal accepted - Level where Likelihood is High - Harshvardhan J. Pandit 2022-08-18 - The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 - - - - - - Examples for Data Privacy Vocabulary - - - - - + Harshvardhan J. Pandit + + 3 Severity Levels + Scale with 3 Severity Levels from High to Low + - - + + Harshvardhan J. Pandit + + Risk Mitigation Measure that controls Impacts accepted - Georg P. Krog - 2024-08-16 - Something that acts as or causes Social Disadvantage - Social Disadvantage - 2022-08-19 + 2024-05-19 - + Impact Control + - + + + + + Control to remedy consequences of event + 2024-05-19 + Remedy Control accepted + + + + - + accepted + Monitor Vulnerabilities + Harshvardhan J. Pandit - Identity Fraud - 2022-08-17 - - 2024-08-16 - Something that acts as or causes Identity Fraud - + Control that monitors a Risk Vulnerability + 2024-05-19 + - - Unauthorised System Modification - - 2024-08-16 - 2022-08-17 - Something that acts as or causes Unauthorised System Modification - Harshvardhan J. Pandit + + 0.14,xsd:decimal accepted - + Harshvardhan J. Pandit + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low + - + 2022-08-17 + Low Risk (RM7x7 S:7 L:1) + - + accepted - + - Harshvardhan J. Pandit - 2024-05-19 - Remove Consequence - Control that removes Consequence i.e. prevents it from materialising + Very High Risk (RM5x5 S:4 L:4) - + Harshvardhan J. Pandit + 2022-08-17 + 0.64,xsd:decimal + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High + - - + + Harshvardhan J. Pandit + 2022-08-18 + Level where Likelihood is High + - Control to identify characteristics of event + 0.75,xsd:decimal accepted - Identification Control - 2024-05-19 - + The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 + High Likelihood + + + - - - + accepted - Indicates the associated context (subject) has indicated vulnerability (object) - - has vulnerability + + + Indicates the vulnerability (subject) is exploited by the indicated threat (object) + + is exploited by + 2024-02-14 - 2024-02-14 - - + - - - - accepted - 2024-05-19 - Control to contain event - Containment Control - - - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves - + + Something that acts as or causes Damage + - Detriment - accepted 2024-08-16 - 2022-03-23 - Something that acts as or causes Detriment + Damage + accepted + 2022-03-30 + Harshvardhan J. Pandit - - - 2024-05-19 - A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again - accepted - Incident Mitigation Measure - + + 2024-08-16 - - - - - Risks and issues that have their origin in environment or can affect the environment at large - Environmental Risk - + accepted - + 2022-08-17 + Unwanted Data Deletion + Harshvardhan J. Pandit + + Something that acts as or causes Unwanted Data Deletion + + + - - Re-identification - Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification - 2022-08-19 - + + - Harshvardhan J. Pandit + 2022-08-17 + Very High Risk (RM5x5 S:5 L:4) + 0.80,xsd:decimal + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High accepted + Harshvardhan J. Pandit + + + + + Incident is realised or materialised risk + Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez + + + + 2024-08-16 + 2024-05-19 + 2024-02-14 - Something that acts as or causes Re-identification - + Incident + + + An actual or occured event + accepted - - + + - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low + 2022-08-17 - 0.12,xsd:decimal accepted - Very Low Risk (RM7x7 S:1 L:6) + Something that acts as or causes Unauthorised Access to Premises + 2024-08-16 + + Unauthorised Access to Premises Harshvardhan J. Pandit - 2022-08-17 - + + + + - + - + Something that acts as or causes Phishing Scam + accepted 2024-08-16 + Phishing Scam - Coercion - Harshvardhan J. Pandit - accepted - Something that acts as or causes Coercion + 2022-08-17 + Harshvardhan J. Pandit + - - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low - 2022-08-17 - Low Risk (RM7x7 S:1 L:7) - 0.14,xsd:decimal - accepted - + + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low + - Harshvardhan J. Pandit + 0.08,xsd:decimal + Harshvardhan J. Pandit + 2022-08-17 + accepted + Extremely Low Risk (RM7x7 S:4 L:1) - - + + 0.12,xsd:decimal + Harshvardhan J. Pandit + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low + 2022-08-17 + - - - Harshvardhan J. Pandit - Here equipment refers to physical equipment + Very Low Risk (RM5x5 S:3 L:1) accepted - Equipment Failure - 2024-08-16 - 2022-08-17 - Something that acts as or causes Equipment Failure - + + - - - + + accepted + Incident Suspected Report + A report describing the suspicion of an incident in the past or occuring - - Harshvardhan J. Pandit - 2022-08-17 - Denial of Service Attack (DoS) - Something that acts as or causes Denial of Service Attack (DoS) - 2024-08-16 - accepted - + + 2024-05-19 - - ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - - + + 0.20,xsd:decimal + + Low Risk (RM7x7 S:5 L:2) Harshvardhan J. Pandit + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low 2022-08-17 accepted - 0.67,xsd:decimal - High Risk (RM3x3 S:2 L:3) - Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - + - + accepted - 2024-05-19 - + Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + Reward + + 2024-04-14 + - Control that changes Consequence - Harshvardhan J. Pandit - Change Consequence - - + 2024-08-16 + Georg P. Krog, Harshvardhan J. Pandit + - - 0.04,xsd:decimal + + Harshvardhan J. Pandit + An impact assessment associated with a incident + 2024-05-19 + + + Incident Impact Assessment + + accepted + + + + + accepted + Something that acts as or causes Blackmail + + Blackmail + + Harshvardhan J. Pandit 2022-08-17 + 2024-08-16 + + + + + 0.99,xsd:decimal + Level where Severity is Extremely High + + + + Extremely High Severity + 2022-08-18 + accepted + The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 + Harshvardhan J. Pandit + + + + - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low + 2022-08-17 + 0.86,xsd:decimal + accepted + Extremely High Risk (RM7x7 S:6 L:7) - Extremely Low Risk (RM7x7 S:1 L:2) + Harshvardhan J. Pandit + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High - + + Control to contain event + + + + accepted - 2022-08-17 - 0.37,xsd:decimal + 2024-05-19 + Containment Control + + + + + A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known + 2024-05-19 + + accepted + Incident Concluding Report + + + accepted + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate + 0.29,xsd:decimal + Moderate Risk (RM7x7 S:2 L:7) + - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High + Harshvardhan J. Pandit - High Risk (RM7x7 S:3 L:6) + 2022-08-17 - - Something that acts as or causes benefits + + + Something that acts as or causes Violation of Statutory Obligations + modified 2024-08-16 - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres - + 2022-08-17 + + This concept was called "ViolationStatutoryObligations" in DPV 2.0 - Benefit - 2022-03-23 + Violation of Statutory Obligations + Harshvardhan J. Pandit + + + + Something that involves or causes judicial costs to be paid + + + accepted + + Judicial Costs - - 2022-08-17 + - accepted - 0.48,xsd:decimal - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + 0.43,xsd:decimal + Very High Risk (RM7x7 S:3 L:7) + accepted + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High + 2022-08-17 Harshvardhan J. Pandit - High Risk (RM5x5 S:4 L:3) - + - - Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + + 2024-08-16 - Reward - 2024-04-14 - Georg P. Krog, Harshvardhan J. Pandit - 2024-08-16 + Harshvardhan J. Pandit + Something that acts as or causes Sabotage + Sabotage + 2022-08-17 + accepted - + + + - - ENISA Threat Landscape 2021 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 - - - - Georg P. Krog, Harshvardhan J. Pandit + + Harshvardhan J. Pandit + - + Very High Severity + The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 + Level where Severity is Very High - Payment - Something that acts as or provides payment e.g. to access a service or purchase resources + 2022-08-18 + 0.9,xsd:decimal accepted - 2024-08-16 - 2024-04-14 - + + - - + + + Georg P. Krog, Harshvardhan J. Pandit + Violation of Rights + This concept was called "ViolationOfRights" in DPV 2.0 - Concepts associated with security threats that are likely to originate externally + 2024-08-16 + 2022-08-18 + Something that acts as or causes Violation of Rights accepted - External Security Threat - + - - Level where Risk is High + - 0.75,xsd:decimal - High Risk - Harshvardhan J. Pandit - accepted + The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 + Very Low Risk + 0.1,xsd:decimal 2022-08-18 - The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 - + accepted + Harshvardhan J. Pandit + Level where Risk is Very Low - - 2024-04-14 + + 2022-08-17 - accepted - + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low + - Something that acts as or provides renumeration which is in monetary or financial form - 2024-08-16 - Georg P. Krog, Harshvardhan J. Pandit - Remuneration - - - - A report describing the suspicion of an incident in the past or occuring - accepted - 2024-05-19 - Incident Suspected Report + Very Low Risk (RM7x7 S:1 L:5) + 0.10,xsd:decimal + Harshvardhan J. Pandit + + + + 0.11,xsd:decimal + 2022-08-17 + - - - - Something that acts as or causes Confidentiality Breach - Confidentiality Breach - 2024-08-16 + accepted Harshvardhan J. Pandit - accepted - - - - - 2022-08-17 - + Low Risk (RM3x3 S:1 L:1) + Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low + - - + + + Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised. - Security Attack - Something that acts as or causes an attack on security with the aim of undermining it + Monitor Control + Risk Mitigation Measure that uses controls to monitor events + 2024-05-19 + Harshvardhan J. Pandit accepted - - - - - - - - Risk Concepts - JSON-LD serialiation - + - - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - accepted - 2022-08-17 - High Risk (RM5x5 S:3 L:4) - Harshvardhan J. Pandit + + Risk Source - - 0.48,xsd:decimal - + 2024-08-16 + The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk + accepted + 2024-02-14 + - - + + 2024-08-16 + This concept was called "ViolationEthicalCode" in DPV 2.0 + 2022-08-17 + + Violating Ethics Code - Something that acts as or causes Component Malfunction - Component Malfunction - Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of - accepted - + Harshvardhan J. Pandit + + Something that acts as or causes Violation of Ethics Code + modified + - - + + Control to detect event + + Detection Control + 2024-05-19 + - Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other. - Risk Matrix - - - Harshvardhan J. Pandit accepted - 2024-02-14 - + - - 2024-08-16 + 2022-08-17 - Something that acts as or causes Unwanted Disclosure of Data - Harshvardhan J. Pandit - accepted - + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High + 0.60,xsd:decimal + + Harshvardhan J. Pandit - Unwanted Disclosure of Data - - + Very High Risk (RM5x5 S:3 L:5) + accepted + - + - + Harshvardhan J. Pandit + Moderate Risk (RM7x7 S:4 L:3) + + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate + 0.24,xsd:decimal accepted - Harshvardhan J. Pandit - 7 Likelihood Levels - 2022-08-18 - Scale with 7 Likelihood Levels from Extremely High to Extremely Low - + 2022-08-17 + - + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 - - - accepted - 2024-05-19 - Confidentiality Incident - - Incident where the confidentiality of information or system has been affected - - - - - accepted - - - - Risk Assessment - - Assessment of risk involving its identification, analysis, and evaluation - ISO 31073:2022 Risk management vocabulary - 2024-02-14 + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + - + - accepted - Something that involves or causes judicial costs to be paid + Harshvardhan J. Pandit + - - Judicial Costs - + 0.25,xsd:decimal + 2022-08-18 + Low Likelihood + Level where Likelihood is Low + accepted + The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 + + + - + + Individual Health & Safety - Harshvardhan J. Pandit - Something that acts as or causes Cryptojacking - accepted - 2024-08-16 - 2022-08-17 - Cryptojacking - + - - + + - - accepted - - Lose of Credibility - Harshvardhan J. Pandit - 2024-08-16 2022-08-17 - Something that acts as or causes Loss of Credibility - - - + accepted + Low Risk (RM5x5 S:4 L:1) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low + Harshvardhan J. Pandit + 0.16,xsd:decimal + + + + Something that acts as or causes Fraud accepted + 2024-08-16 - Harm - 2022-08-13 - Something that acts as or causes Harm to humans - 2024-08-16 - This concept refers to the general abstract notion of harm + - + Harshvardhan J. Pandit + Fraud + 2022-08-17 + + - - + + + Harshvardhan J. Pandit + 0.99,xsd:decimal + - The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 - Level where Risk is Extremely Low + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High + 2022-08-17 accepted - 2022-08-18 - Extremely Low Risk - Harshvardhan J. Pandit - 0.01,xsd:decimal - - + Very High Risk (RM5x5 S:5 L:5) + - + + Harshvardhan J. Pandit - Concepts associated with risks that arise due to User or Human use accepted - User Risks - + 2024-08-16 + Public Order Breach + + Something that acts as or causes Public Order Breach + 2022-08-17 + - - + + accepted + + Harshvardhan J. Pandit + 0.67,xsd:decimal + - - Injury - Something that acts as or causes Injury - - 2024-08-16 + Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + High Risk (RM3x3 S:3 L:2) 2022-08-17 - Harshvardhan J. Pandit - accepted - + - - 0.5,xsd:decimal + + + 3 Risk Levels Harshvardhan J. Pandit - + - - Moderate Risk - Level where Risk is Moderate - accepted - The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 + Scale with 3 Risk Levels from High to Low 2022-08-18 - - - + accepted + - + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + + + - + - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low - - Harshvardhan J. Pandit + Environmental Risk + Risks and issues that have their origin in environment or can affect the environment at large accepted - Very Low Risk (RM5x5 S:1 L:1) - 2022-08-17 - 0.04,xsd:decimal - + - + - Georg P. Krog + 2022-08-17 + accepted 2024-08-16 - 2022-08-19 + Unauthorised Information Disclosure + Something that acts as or causes Unauthorised Information Disclosure - Something that acts as or causes Discrimination - accepted - Discrimination - + Harshvardhan J. Pandit + + + - - Notice associated with an Incident - - - accepted - Incident Notice - 2024-05-19 + - - - - - - - Guides for Data Privacy Vocabulary - - - - - Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate - 2022-08-17 - - Moderate Risk (RM3x3 S:1 L:3) + 2022-08-17 0.33,xsd:decimal accepted + Moderate Risk (RM3x3 S:3 L:1) Harshvardhan J. Pandit + Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - - - - - Harshvardhan J. Pandit - Extremely High Risk (RM7x7 S:7 L:5) - 0.71,xsd:decimal - - accepted - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High - 2022-08-17 - - - - + + - Scale with 7 Severity Levels from Extremely High to Extremely Low - 2022-08-18 - 7 Severity Levels Harshvardhan J. Pandit + Change Impact + 2024-05-19 + Control that changes Impact accepted - + - + + - + - Level where Severity is Extremely Low - Extremely Low Severity - The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 - 0.01,xsd:decimal + accepted + Unauthorised Data Modification Harshvardhan J. Pandit - accepted - 2022-08-18 - + Something that acts as or causes Unauthorised Data Modification + 2024-08-16 + 2022-08-17 + + - - 0.08,xsd:decimal - + + 2024-08-16 + Something that acts as or causes Human Errors + - Very Low Risk (RM7x7 S:1 L:4) + accepted + Human Errors - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low Harshvardhan J. Pandit 2022-08-17 - accepted - + + - - 2022-08-17 - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + Harshvardhan J. Pandit + Low Severity + 2022-08-18 + Level where Severity is Low + - - Sexual Violence - - Something that acts as or causes Sexual Violence - 2024-08-16 - Harshvardhan J. Pandit + 0.25,xsd:decimal accepted - + The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 + + + + - - Harshvardhan J. Pandit - accepted + - 2022-08-17 - 0.06,xsd:decimal + accepted + 0.20,xsd:decimal + Harshvardhan J. Pandit - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low - Extremely Low Risk (RM7x7 S:1 L:3) - + 2022-08-17 + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low + Low Risk (RM5x5 S:5 L:1) + - - Scale with 3 Likelihood Levels from High to Low - - 3 Likelihood Levels + Harshvardhan J. Pandit - accepted - + + - 2022-08-18 - - - - - Moderate Risk (RM3x3 S:3 L:1) - - - - 0.33,xsd:decimal - Harshvardhan J. Pandit + Something that acts as or causes Personal Safety Endangerment accepted 2022-08-17 - Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - + 2024-08-16 + + Personal Safety Endangerment + - - Something that acts as or causes violation of policy which can be either internal or external policy - Violating Policy + + Unauthorised Data Access + 2024-08-16 - accepted - + Something that acts as or causes Unauthorised Data Access + + + Harshvardhan J. Pandit + 2022-08-17 + + - + + 0.32,xsd:decimal - Moderate Risk (RM5x5 S:3 L:3) - accepted - 0.36,xsd:decimal - + Moderate Risk (RM5x5 S:4 L:2) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate + Harshvardhan J. Pandit - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate 2022-08-17 + accepted - - 2022-08-18 - The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 - Harshvardhan J. Pandit + + 2024-05-19 + - - - 0.9,xsd:decimal + Identifier associated with an incident accepted - Level where Likelihood is Very High - Very High Likelihood - - + Incident Identifier + - - 0.43,xsd:decimal - - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High - Very High Risk (RM7x7 S:3 L:7) - + + - Harshvardhan J. Pandit + 0.22,xsd:decimal accepted + + Harshvardhan J. Pandit + Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low + Low Risk (RM3x3 S:1 L:2) 2022-08-17 - + - + - Something that acts as or causes Non-Material Damage - The criteria for what is considered material damage is based in jurisdictional laws and norms + Denial of Service Attack (DoS) accepted + 2022-08-17 + 2024-08-16 + + Something that acts as or causes Denial of Service Attack (DoS) + Harshvardhan J. Pandit - Harshvardhan J. Pandit - 2022-03-30 - Non-Material Damage - 2024-08-16 - + + - - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low - - accepted - 0.12,xsd:decimal - 2022-08-17 + + modified + DGA 2.10 + 2024-08-16 - + - Harshvardhan J. Pandit - Very Low Risk (RM5x5 S:3 L:1) - + 2024-04-14 + Georg P. Krog, Harshvardhan J. Pandit + Fee + Something that acts as or provides fees e.g. for using a service + + - + + Control that monitors a Risk Source + + + - accepted - Incident Detection Report - A report describing the detection of a Incident - + Monitor Risk Source + Harshvardhan J. Pandit 2024-05-19 + accepted + + + + Copyright Violation + - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - ENISA Reference Incident Classification Taxonomy 2018 - - - - Something that acts as or causes Loss of Opportunity + 2022-08-17 2024-08-16 + Something that acts as or causes Copyright Violation accepted - - - - Lose of Opportunity Harshvardhan J. Pandit - 2022-08-17 - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + - + https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + ISO/IEC 27005:2018 - - + + accepted + - Harshvardhan J. Pandit - accepted - 0.12,xsd:decimal - 2022-08-17 - Very Low Risk (RM7x7 S:3 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low - - - - - has risk source - Indicates the risk (subject) has the indicated risk source (object) - - 2024-02-14 - - - - accepted - - + Something that acts as or causes violation of policy which can be either internal or external policy + Violating Policy + - - - Cross-Border Incident + - accepted - 2024-05-19 - Incident involving cross-border or multiple jurisdictions + Harshvardhan J. Pandit + A register recording incidentes, their reports, notifications, and other related activities + Incident Register - - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 - - - Detection Control - + + 2024-05-19 accepted + + - Control to detect event - 2024-05-19 - - - + accepted 2024-05-19 - Environmental Incident - - - + Harshvardhan J. Pandit + Remove Consequence + Control that removes Consequence i.e. prevents it from materialising - Incident caused due to environmental factors outside human controls - accepted + - - Low Risk (RM5x5 S:1 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low - + + Identity Fraud + 2024-08-16 + 2022-08-17 + - Harshvardhan J. Pandit - accepted - 0.20,xsd:decimal - 2022-08-17 - + + Something that acts as or causes Identity Fraud + + Harshvardhan J. Pandit + + - + + 2024-08-16 + Data Corruption + Harshvardhan J. Pandit - accepted + + 2022-08-17 + modified + This concept was called "Corruption Data" in DPV 2.0 + + + Something that acts as or causes Corruption of Data + + + + + + High Risk (RM5x5 S:2 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High + 2022-08-17 + accepted + 0.40,xsd:decimal - 2022-03-30 - Damage - 2024-08-16 - Something that acts as or causes Damage - + Harshvardhan J. Pandit + - - - - - Risk Mitigation Measure that uses controls to monitor events - 2024-05-19 - Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised. + + + + is vulnerability of - Harshvardhan J. Pandit + Indicates the vulnerability (subject) is associated with indicated context (object) + + accepted - Monitor Control - + 2024-02-14 - - 2022-08-17 - - 2024-08-16 + accepted - Something that acts as or causes Impact to Rights - Harshvardhan J. Pandit - + - Impact to Rights - This concept was called "ImpactToRights" in DPV 2.0 - - + Harshvardhan J. Pandit + Very High Risk (RM7x7 S:6 L:5) + 0.61,xsd:decimal + 2022-08-17 + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High + - + + Harm + Something that acts as or causes Harm to humans - accepted - Judicial Penalty - Something that involves or causes judicial penalties to be paid - - - - - - Authorisation Failure + Harshvardhan J. Pandit + This concept refers to the general abstract notion of harm 2024-08-16 - 2022-08-17 - Something that acts as or causes Authorisation Failure + 2022-08-13 accepted - - - - Harshvardhan J. Pandit - + - + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ ENISA Reference Incident Classification Taxonomy 2018 - - Harshvardhan J. Pandit - accepted - + - - - Something that acts as or causes Copyright Violation - - 2022-08-17 - 2024-08-16 - Copyright Violation - - - - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High - 0.64,xsd:decimal - - + accepted + Low Risk (RM5x5 S:2 L:2) + Harshvardhan J. Pandit + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low + 0.16,xsd:decimal 2022-08-17 - accepted - Very High Risk (RM5x5 S:4 L:4) - + + Harshvardhan J. Pandit - accepted - 2024-05-19 + - + - Monitor Control + 2024-08-16 + 2022-08-17 + Something that acts as or causes Loss of Goodwill + accepted + Lose of Goodwill + + + + 2024-02-14 + has control + + + - Control that monitors another Control - + Indicates the use of specified control + accepted + - - Physical Harm - - - + + accepted + 2024-02-14 + + + + + Indicates an incident is associated with the specified context + has incident + + + + + + accepted - + 2024-02-14 + + Indicates the associated context (subject) is caused by the indicated vulnerability (object) + caused by vulnerability - - 2022-08-17 + + The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 + Harshvardhan J. Pandit + - - Something that acts as or causes Unauthorised System Access - Unauthorised System Access - 2024-08-16 + Level where Risk is Low + 2022-08-18 + 0.25,xsd:decimal - - Harshvardhan J. Pandit + Low Risk accepted - + + + - - 2024-08-16 - Something that acts as or causes Malicious Code Attack + + 2022-08-17 - - accepted + Harshvardhan J. Pandit - Harshvardhan J. Pandit - 2022-08-17 - Malicious Code Attack - + Something that acts as or causes Erroneous System Use + accepted + 2024-08-16 + + Erroneous System Use + - - Moderate Risk (RM3x3 S:2 L:2) + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + ENISA Threat Taxonomy 2016 + + + Extremely High Risk (RM7x7 S:5 L:7) + accepted - accepted - 2022-08-17 Harshvardhan J. Pandit - Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate - 0.44,xsd:decimal - + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High + 2022-08-17 + 0.71,xsd:decimal + - - - accepted - - - - Monitor Vulnerabilities + + + Julian Flake + Rob Brennan + Fajar Ekaputra Harshvardhan J. Pandit - Control that monitors a Risk Vulnerability - 2024-05-19 - + Beatriz Esteves + Axel Polleres + Georg P. Krog + Julio Fernandez + Delaram Golpayegani + Paul Ryan + Georg P. Krog + Delaram Golpayegani + Harshvardhan J. Pandit + Beatriz Esteves + Rob Brennan + Julian Flake + http://www.w3.org/2004/02/skos/core + + http://www.w3.org/2000/01/rdf-schema + + + + 10.5281/zenodo.12505841 + + + + + + + + + + + + + Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 + http://purl.org/ontology/bibo/status/published + 2022-08-14 + https://w3id.org/dpv/risk + Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management + 2.1-dev + + 2022-08-14 + + + RISK + risk + 2.1-dev + 2024-07-13 + Risk Concepts + https://w3id.org/dpv/risk# - + - + - Level where Likelihood is Very Low - - Harshvardhan J. Pandit - The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 - accepted - 0.1,xsd:decimal - Very Low Likelihood - 2022-08-18 - - - - - 0.25,xsd:decimal - 2022-08-18 + + accepted - The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 - - - + Something that acts as or causes Data Breach + 2024-08-16 + Data Breach + Harshvardhan J. Pandit - Level where Severity is Low - Low Severity - - - + 2022-08-17 + + + + - + 2022-08-17 - Very High Risk (RM7x7 S:5 L:5) - 0.51,xsd:decimal - - accepted - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High + - + + 2024-08-16 + accepted + Unauthorised System Access + Harshvardhan J. Pandit - + Something that acts as or causes Unauthorised System Access + + + - - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High - Very High Risk (RM5x5 S:5 L:4) - + + 2024-05-19 + Incident Report + + - Harshvardhan J. Pandit + Documented information about an incident, its handling, assessments,and notifications + accepted + + accepted - 0.80,xsd:decimal + Harshvardhan J. Pandit + Something that acts as or causes Injury 2022-08-17 - + + + + + Injury + 2024-08-16 + - - accepted - 2024-05-19 - Avoid Source - Control that avoids the risk source + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - + - Harshvardhan J. Pandit - + Societal Health & Safety + accepted + - - This concept was called "InterceptionCommunications" in DPV 2.0 - Something that acts as or causes Interception of Communications + + + A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known + 2024-05-19 - - modified + accepted + Incident Preliminary Report + + + Harshvardhan J. Pandit + Lose of Opportunity + 2022-08-17 - - Intercept Communications + + + + accepted + Something that acts as or causes Loss of Opportunity 2024-08-16 - + - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - Control that monitors a Risk Impact + 2024-05-19 Harshvardhan J. Pandit accepted - 2024-05-19 - Monitor Impact - + Reduce Severity + Control that reduces the severity of an event + - - 0.22,xsd:decimal + + 0.48,xsd:decimal + 2022-08-17 + Harshvardhan J. Pandit + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High + High Risk (RM5x5 S:3 L:4) accepted - Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low - Low Risk (RM3x3 S:2 L:1) - 2022-08-17 - - + - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + + 2024-05-19 - 2024-02-14 accepted - - Source of threat event, including both agent and non-agent sources - Threat Source - + Availability Incident + Incident where the availability of information or system has been affected - - - - 2024-08-16 - + + + 0.08,xsd:decimal Harshvardhan J. Pandit - accepted - Unwanted Data Deletion 2022-08-17 - Something that acts as or causes Unwanted Data Deletion - + + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low + Very Low Risk (RM5x5 S:1 L:2) + accepted + - - Risk Matrix 5x5 + - + - A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types Harshvardhan J. Pandit - accepted 2022-08-17 - + + accepted + Cryptojacking + Something that acts as or causes Cryptojacking + 2024-08-16 + + - - https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + + Very Low Risk (RM5x5 S:1 L:1) + accepted + + Harshvardhan J. Pandit + 0.04,xsd:decimal 2022-08-17 + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low + + + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 + + + + Harshvardhan J. Pandit - 0.71,xsd:decimal + + + + 2024-05-19 + accepted + Risk Mitigation Measure that shares Risk e.g. amongst stakeholders + Share Risk + + + + 0.37,xsd:decimal + + + - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High + Harshvardhan J. Pandit + 2022-08-17 + High Risk (RM7x7 S:3 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High accepted - Extremely High Risk (RM7x7 S:5 L:7) - + + Harshvardhan J. Pandit + Lose of Credibility + - Incident caused due to accidental actions arising from human or human-controlled situations + 2024-08-16 + + Something that acts as or causes Loss of Credibility accepted - Accidental Incident - 2024-05-19 - + 2022-08-17 + - - Things that cause or have the potential to impact financial resources + - accepted - Financial Impact - + - - - - - 2024-08-16 - Something that acts as or causes Human Errors accepted - Human Errors + 2024-05-19 + Control that monitors a Risk + Monitor Risk + Harshvardhan J. Pandit + + + - Harshvardhan J. Pandit + Compensation + Something that acts as or provides compensation - which can be monetary and financial or in other forms + accepted + 2024-08-16 + Georg P. Krog, Harshvardhan J. Pandit + 2024-04-14 - 2022-08-17 - + - - Harshvardhan J. Pandit - accepted + + - - 2022-08-17 - 0.37,xsd:decimal - High Risk (RM7x7 S:6 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High + 0.5,xsd:decimal + Moderate Severity + accepted + The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 - + Harshvardhan J. Pandit + Level where Severity is Moderate + 2022-08-18 + + + - - - Risk Concepts - Turtle serialiation + - + + + + Risk Concepts - JSON-LD serialiation - - - Risks and issues that affect or have the potential to affect society at large or specific groups in society - - - - - accepted - Societal Risk - + + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 - - + - Individual Health & Safety - accepted - - - - Harshvardhan J. Pandit + 2024-08-16 2022-08-17 - Low Risk (RM3x3 S:1 L:2) - Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low - - - - - 0.22,xsd:decimal accepted - + Something that acts as or causes Loss of Customer Confidence + Lose of Customer Confidence + + + Harshvardhan J. Pandit + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - Something that acts as or causes Unauthorised Re-Identification - 2024-08-16 - - - - Unauthorised Re-Identification - 2022-08-19 - - Georg P. Krog + accepted - - - - Something that acts as or causes Sabotage - 2024-08-16 - + - - Sabotage + 0.14,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low Harshvardhan J. Pandit - accepted + Low Risk (RM7x7 S:1 L:7) 2022-08-17 - + - - accepted + + + Something that acts as or causes Illegal Processing of Data + Illegal Data Processing + 2024-08-16 + 2022-08-17 - Harshvardhan J. Pandit - 2022-08-17 - - - 2024-08-16 - Something that acts as or causes Unauthorised Code Access - Unauthorised Code Access - - - accepted - Reputational Risk - - - - Risks and issues that affect the reputation of the organisation - + Harshvardhan J. Pandit + This concept was called "IllegalProcessingData" in DPV 2.0 + - - + + + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High - - accepted - 2022-08-17 - 2024-08-16 - Fraud - Something that acts as or causes Fraud Harshvardhan J. Pandit - + 2022-08-17 + accepted + High Risk (RM7x7 S:7 L:3) + 0.43,xsd:decimal + - - + + Very Low Risk (RM7x7 S:1 L:6) + + 0.12,xsd:decimal - Control that halts the risk source or prevents it from materialising Harshvardhan J. Pandit - Halt Source + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low + 2022-08-17 accepted - 2024-05-19 - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - + - - + + Harshvardhan J. Pandit + + 2022-08-17 + - Harshvardhan J. Pandit - 0.20,xsd:decimal - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low - - Low Risk (RM5x5 S:5 L:1) accepted - 2022-08-17 - + 2024-08-16 + + Something that acts as or causes Unauthorised Code Disclosure + Unauthorised Code Disclosure + + - + + + 0.18,xsd:decimal accepted - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate 2022-08-17 - + Low Risk (RM7x7 S:3 L:3) + Harshvardhan J. Pandit + - Harshvardhan J. Pandit - 0.32,xsd:decimal - Moderate Risk (RM5x5 S:2 L:4) - - + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low + - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - - - - Primer for Data Privacy Vocabulary - - - - Blackmail + - - Harshvardhan J. Pandit - - accepted - 2022-08-17 - Something that acts as or causes Blackmail - 2024-08-16 - + Integrity Incident + + + Incident where the integrity of information or system has been affected + 2024-05-19 - + + 2022-08-17 - + - Consequence Control + Something that acts as or causes Confidentiality Breach + + accepted + 2024-08-16 + Confidentiality Breach - Risk Mitigation Measure that controls the Consequences Harshvardhan J. Pandit - accepted - 2024-05-19 - + + - - 2022-08-17 - Moderate Risk (RM7x7 S:6 L:2) + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + https://www.iso.org/standard/75281.html + + ISO/IEC 27005:2018 + + - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate - Harshvardhan J. Pandit - 0.24,xsd:decimal - accepted - - - - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - High Risk (RM7x7 S:4 L:5) - - - + Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High Harshvardhan J. Pandit - accepted 2022-08-17 - 0.41,xsd:decimal - + High Risk (RM3x3 S:3 L:3) + 0.99,xsd:decimal + - - 2022-08-17 - 2024-08-16 - Something that acts as or causes Unauthorised Information Disclosure + + + + Risk Concepts - Turtle serialiation + + + + + + 2024-02-14 - Unauthorised Information Disclosure + The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing + Harshvardhan J. Pandit + - - - Harshvardhan J. Pandit + Incident Suspected accepted - + - + + 2024-08-16 - - Something that acts as or causes System Intrusion - 2024-08-16 - System Intrusion + + 2022-08-17 accepted Harshvardhan J. Pandit - 2022-08-17 + Something that acts as or causes Extorsion + Extorsion + - - Something that acts as or causes Equipment Malfunction - Equipment Malfunction - Here equipment refers to physical equipment - Harshvardhan J. Pandit + + A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence accepted - + + Incident Handling Report - 2022-08-17 - - 2024-08-16 - + 2024-05-19 - - + + ISO/IEC 27005:2018 + + https://www.iso.org/standard/75281.html + + + Something that acts as or causes Discrimination + 2022-08-19 + 2024-08-16 + - Harshvardhan J. Pandit - 0.80,xsd:decimal - 2022-08-17 - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High accepted - Very High Risk (RM5x5 S:4 L:5) - + Discrimination + Georg P. Krog + - + + accepted - - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - + Something that involves or causes judicial penalties to be paid + Judicial Penalty + - - + + accepted + + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High - 0.9,xsd:decimal + High Risk (RM7x7 S:4 L:4) + 2022-08-17 + Harshvardhan J. Pandit + 0.33,xsd:decimal + + + + + + + 0.08,xsd:decimal + 2022-08-17 + Very Low Risk (RM5x5 S:2 L:1) + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low accepted - Very High Severity + Harshvardhan J. Pandit - 2022-08-18 - Level where Severity is Very High - The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 - - + - - - Risk Concepts - RDF/XML serialiation - - - - + + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 - - The incident is ongoing i.e. still active - + + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate + 0.24,xsd:decimal + accepted + - Incident Ongoing - accepted - 2024-02-14 Harshvardhan J. Pandit - + Moderate Risk (RM7x7 S:3 L:4) + 2022-08-17 + - + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - - - - - + Harshvardhan J. Pandit - Something that acts as or causes Unauthorised Data Access 2022-08-17 - Unauthorised Data Access - 2024-08-16 + + + + 0.24,xsd:decimal accepted - + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate + Moderate Risk (RM5x5 S:2 L:3) + - - + + Something that acts as or causes an attack on security with the aim of undermining it + + - accepted - Georg P. Krog, Harshvardhan J. Pandit - This concept was called "LimitationOfRights" in DPV 2.0 - Something that acts as or causes Limitation of Rights - Limitation of Rights - 2022-08-18 - 2024-08-16 - + Security Attack + + + + - - 2022-08-17 - Low Risk (RM7x7 S:7 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low + + Very High Risk (RM7x7 S:4 L:7) + Harshvardhan J. Pandit - 0.14,xsd:decimal - + - + 0.57,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High + 2022-08-17 accepted - - + + - 0.31,xsd:decimal - 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High - accepted - High Risk (RM7x7 S:3 L:5) + 0.49,xsd:decimal + accepted + 2022-08-17 + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High + Very High Risk (RM7x7 S:6 L:4) Harshvardhan J. Pandit - + + accepted - + + + 2024-05-19 + Monitor Consequence Harshvardhan J. Pandit - 2022-08-18 - 5 Likelihood Levels + Control that monitors a Risk Consequence + + + + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 + + + 2024-02-14 + + + + Risk source event which causes Risk + Threat accepted - Scale with 5 Likelihood Levels from Very High to Very Low - - - 0.24,xsd:decimal - + + Here system refers to both hardware and software systems + 2024-08-16 + + + + 2022-08-17 accepted - Moderate Risk (RM7x7 S:3 L:4) + + + Harshvardhan J. Pandit + System Failure + Something that acts as or causes System Failure + + + + + Something that acts as or causes Coercion + + Harshvardhan J. Pandit 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate - + - - - - Harshvardhan J. Pandit + 2024-08-16 + Coercion accepted + + + + + - - 2022-08-17 - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate - Moderate Risk (RM5x5 S:2 L:3) - 0.24,xsd:decimal + accepted + Incident Concluded + 2024-02-14 + Harshvardhan J. Pandit + The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring - + - + + 2022-08-17 + + + + accepted + 0.73,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High - High Risk (RM7x7 S:4 L:4) - 0.33,xsd:decimal + Harshvardhan J. Pandit + Extremely High Risk (RM7x7 S:6 L:6) + + + + 2024-08-16 - + accepted - 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High + Something that acts as or causes Terrorism + Terrorism + Harshvardhan J. Pandit - + 2022-08-17 + + - - Incident Identifier - - Identifier associated with an incident + + 2022-08-18 + + Scale with 3 Likelihood Levels from High to Low accepted - 2024-05-19 - - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + + Harshvardhan J. Pandit + 3 Likelihood Levels + - - 2024-08-16 + + Harshvardhan J. Pandit + Very Low Risk (RM5x5 S:1 L:3) + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low + 0.12,xsd:decimal 2022-08-17 - Phishing Scam - Something that acts as or causes Phishing Scam - + - - - Harshvardhan J. Pandit + accepted - + - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + + 2024-02-14 + + caused by threat + + Indicates the cause of associated context (subject) was the indicated threat (object) + + + + accepted - - Security Breach + + + + Risk Concepts - RDF/XML serialiation + + + + + + 2024-05-19 - - Harshvardhan J. Pandit - 2022-08-17 - Something that acts as or causes Security Breach - 2024-08-16 + A report describing the detection of a Incident + + Incident Detection Report accepted - - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 - - Control that modifies risk - Risk Control + + accepted + 0.24,xsd:decimal + Moderate Risk (RM5x5 S:3 L:2) + Harshvardhan J. Pandit + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate + + 2022-08-17 - accepted - 2024-05-19 - - + - + + - - + The state where an incident was almost successful in taking place i.e. "it came very close" accepted - + 2024-02-14 + Incident Near Miss + + Harshvardhan J. Pandit + - - https://www.iso.org/standard/75281.html + + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - - + + accepted + + 2024-02-14 + Source of threat event, including both agent and non-agent sources + - - Financial Loss - - Harshvardhan J. Pandit - accepted - 2024-08-16 - 2022-08-17 - Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity - + Threat Source - - 0.25,xsd:decimal - 2022-08-18 - Low Likelihood + + 0.29,xsd:decimal - + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate + - The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 Harshvardhan J. Pandit + 2022-08-17 + Moderate Risk (RM7x7 S:7 L:2) accepted - Level where Likelihood is Low - - - + - - + + 0.12,xsd:decimal + - accepted - Internal Security Threat - Concepts associated with security threats and issues that originate within the organisation - - - - accepted - - - - 2022-08-17 - Something that acts as or causes a compromised account that is then used by the compromiser Harshvardhan J. Pandit - 2024-08-16 - Compromise Account - - - + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low + 2022-08-17 + Very Low Risk (RM7x7 S:6 L:1) + accepted + - - Something that acts as or causes Malware Attack + + Something that acts as or causes Unauthorised Code Access + 2024-08-16 - - - Malware Attack - accepted + 2022-08-17 + accepted + Unauthorised Code Access + Harshvardhan J. Pandit - 2022-08-17 + + - - 2024-08-16 + - Something that acts as or causes Unwanted Code Deletion - Unwanted Code Deletion + Scale with 7 Severity Levels from Extremely High to Extremely Low + 7 Severity Levels Harshvardhan J. Pandit - accepted - + - 2022-08-17 - - + 2022-08-18 + accepted + - - + + - Something that acts as or causes Loss of Trust - - - Lose of Trust + System Malfunction Harshvardhan J. Pandit - 2022-08-17 + Here system refers to both hardware and software systems accepted 2024-08-16 - - - - - - Risk Concepts - N3 serialiation - - - - - - Harshvardhan J. Pandit - accepted + 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High - 0.43,xsd:decimal - - - - High Risk (RM7x7 S:7 L:3) - + Something that acts as or causes System Malfunction + + - - + - + - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High - Very High Risk (RM5x5 S:5 L:5) - 2022-08-17 - 0.99,xsd:decimal - Harshvardhan J. Pandit accepted - + Societal Risk + Risks and issues that affect or have the potential to affect society at large or specific groups in society + + - - Lose of Reputation - Harshvardhan J. Pandit - + + - Something that acts as or causes Loss of Reputation - - - 2022-08-17 + Identification Control accepted - 2024-08-16 - + + Control to identify characteristics of event + 2024-05-19 + - + Harshvardhan J. Pandit + + - - 2022-08-17 - Low Risk (RM7x7 S:2 L:4) - - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low accepted - 0.16,xsd:decimal - + 2024-02-14 + The incident has halted or paused with a high likelihood of resuming or recurring + Incident Halted + - - Harshvardhan J. Pandit + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + - - The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 - 0.5,xsd:decimal - Level where Likelihood is Moderate - 2022-08-18 + Harshvardhan J. Pandit + 2022-08-17 + 0.48,xsd:decimal accepted - Moderate Likelihood - - - + High Risk (RM5x5 S:4 L:3) + - + + Harshvardhan J. Pandit - accepted + 2024-05-19 + - - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - 0.06,xsd:decimal - Extremely Low Risk (RM7x7 S:3 L:1) - 2022-08-17 - - + Control that changes Consequence + Change Consequence + accepted + - - + + 2024-05-19 - + + Control that modifies risk + accepted - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - 2022-08-17 - Harshvardhan J. Pandit - Moderate Risk (RM5x5 S:4 L:2) - 0.32,xsd:decimal - - - - 2022-08-17 + Risk Control + + 2024-08-16 - accepted - Harshvardhan J. Pandit - Something that acts as or causes Physical Assault - - Physical Assault - - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - + 2024-04-14 + accepted + Georg P. Krog, Harshvardhan J. Pandit + Payment + + Something that acts as or provides payment e.g. to access a service or purchase resources + - - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate - Harshvardhan J. Pandit - + - Moderate Risk (RM7x7 S:2 L:6) - 0.24,xsd:decimal - accepted - 2022-08-17 - + + 2024-02-14 + Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk + + Vulnerability - - + + - Control that changes Impact - Change Impact accepted - 2024-05-19 + Very High Likelihood + 2022-08-18 + 0.9,xsd:decimal Harshvardhan J. Pandit - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - + Level where Likelihood is Very High + The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 + + - - - - Indicates the threat (subject) exploits the indicated vulnerability (object) - - + + Harshvardhan J. Pandit + + + accepted + Incident Mitigated 2024-02-14 - exploits vulnerability - - + The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring + - + - + - 2024-08-16 - Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques - Harshvardhan J. Pandit - 2022-08-17 + The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 accepted - Brute Force Authorisations - - + 0.1,xsd:decimal + Very Low Likelihood + Harshvardhan J. Pandit + 2022-08-18 + Level where Likelihood is Very Low + + - + - accepted - Risk Mitigation Measure that shares Risk e.g. amongst stakeholders - Harshvardhan J. Pandit 2024-05-19 - Share Risk + Incident Assessment Report + A report describing the assessment of an incident in terms of its effects or impacts + - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + 2022-08-17 + 0.36,xsd:decimal + + + + Moderate Risk (RM5x5 S:3 L:3) + accepted + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate + + Harshvardhan J. Pandit + - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + + + + Status associated with an incident + accepted + 2024-02-14 + + Incident Status + Harshvardhan J. Pandit + + - - Societal Health & Safety + accepted - + + System Intrusion + - - - - This concept was called "HarmfulSpeech" in DPV 2.0 2022-08-17 - Something that acts as or causes Harmful Speech 2024-08-16 - accepted + Harshvardhan J. Pandit + Something that acts as or causes System Intrusion + + + + + + + Concepts associated with security threats that are likely to originate externally - Exposure to Harmful Speech + accepted + + External Security Threat + + + + accepted + + + + Low Risk (RM7x7 S:2 L:4) Harshvardhan J. Pandit - - + 0.16,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low + 2022-08-17 + - - 2024-04-14 - Georg P. Krog, Harshvardhan J. Pandit - DGA 2.10 - modified - + + + accepted - Fee - Something that acts as or provides fees e.g. for using a service - 2024-08-16 - + + - - Harshvardhan J. Pandit - accepted - 2024-05-19 + + Unauthorised Activity - + - Monitor Risk Source - Control that monitors a Risk Source - + accepted + Something that acts as or causes Unauthorised Activity + + + + - - 2022-08-18 - + + + 2022-08-17 + accepted + Lose of Trust + Something that acts as or causes Loss of Trust + 2024-08-16 Harshvardhan J. Pandit - Scale with 5 Severity Levels from Very High to Very Low - accepted - 5 Severity Levels - + + - - Something that acts as or causes Scam - 2024-08-16 - accepted - 2022-08-17 - + + - Harshvardhan J. Pandit - Scam + 2022-08-18 + accepted + Scale with 7 Risk Levels from Extremely High to Extremely Low - - - - - ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html - - - - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - ENISA Threat Landscape for Ransomware Attacks 2022 + Harshvardhan J. Pandit + 7 Risk Levels + - - + + - Control to recover from event - Recovery Control - accepted + Privacy - 2024-05-19 - - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + accepted + - - Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High - Harshvardhan J. Pandit + + 2022-08-17 accepted - + + Harshvardhan J. Pandit + Moderate Risk (RM3x3 S:1 L:3) + Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate + - 2022-08-17 - 0.99,xsd:decimal - - High Risk (RM3x3 S:3 L:3) + 0.33,xsd:decimal - + - 0.02,xsd:decimal - Extremely Low Risk (RM7x7 S:1 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low + Risk Matrix 3x3 Harshvardhan J. Pandit - accepted 2022-08-17 - + accepted + A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types + - + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + ENISA Reference Incident Classification Taxonomy 2018 - + - 0.49,xsd:decimal - 2022-08-17 - Very High Risk (RM7x7 S:4 L:6) - accepted + The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 - + + Extremely Low Risk + 0.01,xsd:decimal + 2022-08-18 + accepted Harshvardhan J. Pandit - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High - + Level where Risk is Extremely Low + - - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - ENISA Threat Taxonomy 2016 - + + Control that halts the risk source or prevents it from materialising + + Harshvardhan J. Pandit + + + + 2024-05-19 + Halt Source + accepted + - + + 2024-08-16 - accepted - - Something that acts as or causes Account Credentials to be compromised - Compromise Account Credentials + Violation of Contractual Obligation - Harshvardhan J. Pandit + This concept was called "ViolationContractualObligations" in DPV 2.0 + Something that acts as or causes Violation of Contractual Obligations 2022-08-17 - + Harshvardhan J. Pandit + modified + - - 2024-08-16 - 2022-08-17 - + Harshvardhan J. Pandit + Extremely Low Risk (RM7x7 S:1 L:3) + + + accepted - Extorsion - + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low + 0.06,xsd:decimal + + 2022-08-17 + + + + + Unauthorised Resource Use + accepted + Something that acts as or causes Unauthorised Resource Use - Something that acts as or causes Extorsion + Harshvardhan J. Pandit + + 2024-08-16 + 2022-08-17 + - - Risk source event which causes Risk - - accepted - - 2024-02-14 + + Harshvardhan J. Pandit + Very High Risk (RM7x7 S:4 L:6) + - Threat - - + 0.49,xsd:decimal accepted - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low - 0.10,xsd:decimal - - - 2022-08-17 - Very Low Risk (RM7x7 S:5 L:1) - Harshvardhan J. Pandit + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High - - - accepted - The criteria for what is considered material damage is based in jurisdictional laws and norms + + https://www.iso.org/standard/75281.html + + ISO/IEC 27005:2018 + + - + + A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types + Harshvardhan J. Pandit - 2022-03-30 - Something that acts as or causes Material Damage - 2024-08-16 - Material Damage - + Risk Matrix 7x7 + 2022-08-17 + accepted + - - Risk Analysis + + Extremely Low Severity + Harshvardhan J. Pandit - + + + + The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 + Level where Severity is Extremely Low accepted + 0.01,xsd:decimal + 2022-08-18 + + + + Georg P. Krog, Harshvardhan J. Pandit + - Harshvardhan J. Pandit - A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures - + This concept was called "PreventExercisingOfRights" in DPV 2.0 + + Something that acts as or causes Prevent Exercising of Rights 2022-08-18 + Prevent Exercising of Rights + accepted + 2024-08-16 + - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - Moderate Risk (RM7x7 S:5 L:3) + - Harshvardhan J. Pandit - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - 0.31,xsd:decimal 2022-08-17 + 0.24,xsd:decimal accepted + + Harshvardhan J. Pandit + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate + Moderate Risk (RM7x7 S:2 L:6) - - accepted - + + + + Primer for Data Privacy Vocabulary + + + + + + Confidentiality Incident - 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low - Harshvardhan J. Pandit - 0.08,xsd:decimal - - Extremely Low Risk (RM7x7 S:4 L:1) - - - - Scale with 7 Risk Levels from Extremely High to Extremely Low + Incident where the confidentiality of information or system has been affected + + 2024-05-19 - 7 Risk Levels - Harshvardhan J. Pandit accepted - - - - 2022-08-18 - - - - - accepted - Indicates the cause of associated context (subject) was the indicated threat (object) - + - - 2024-02-14 - caused by threat - - + Harshvardhan J. Pandit 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate - Moderate Risk (RM7x7 S:2 L:7) - Harshvardhan J. Pandit - 0.29,xsd:decimal - + Very Low Risk (RM7x7 S:1 L:4) accepted + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low + 0.08,xsd:decimal - - Low Risk (RM5x5 S:4 L:1) - - - - 2022-08-17 - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low + + Unauthorised System Modification + Harshvardhan J. Pandit - 0.16,xsd:decimal - accepted - - - - - 2024-05-19 - Incident Assessment Report - + 2022-08-17 + - A report describing the assessment of an incident in terms of its effects or impacts + Something that acts as or causes Unauthorised System Modification + 2024-08-16 accepted + + - + 2022-08-17 - + - Harshvardhan J. Pandit - 0.57,xsd:decimal - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High - Very High Risk (RM7x7 S:4 L:7) + Harshvardhan J. Pandit accepted - + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High + Very High Risk (RM5x5 S:4 L:5) + 0.80,xsd:decimal + - - - ENISa Trust Services Security Incidents 2021 - https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 + + + + + Examples for Data Privacy Vocabulary + + - - 2024-08-16 + + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High 2022-08-17 - Violating Ethics Code - - This concept was called "ViolationEthicalCode" in DPV 2.0 - Harshvardhan J. Pandit - modified - Something that acts as or causes Violation of Ethics Code - + - - - - - Harshvardhan J. Pandit + High Risk (RM5x5 S:5 L:3) accepted - - - - 0.16,xsd:decimal - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - Low Risk (RM5x5 S:2 L:2) - 2022-08-17 + Harshvardhan J. Pandit + 0.60,xsd:decimal - - + + Level where Risk is Very High - accepted - 3 Risk Levels + The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 + Harshvardhan J. Pandit - Scale with 3 Risk Levels from High to Low 2022-08-18 - - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - 2022-08-17 - 0.08,xsd:decimal - Extremely Low Risk (RM7x7 S:2 L:2) + Very High Risk + 0.9,xsd:decimal accepted + + + + - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low + accepted + Very Low Risk (RM7x7 S:5 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low Harshvardhan J. Pandit + 2022-08-17 + 0.10,xsd:decimal - - 2024-05-19 - + accepted + A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated + + 2024-05-19 + + Incident Ongoing Report - - Deliberate Incident - Incident caused due to deliberate actions of a human - - Vulnerability - 2024-02-14 - Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk + + 0.06,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low + + + + Harshvardhan J. Pandit + Extremely Low Risk (RM7x7 S:3 L:1) + 2022-08-17 + accepted + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + accepted + 5 Severity Levels + + Harshvardhan J. Pandit + 2022-08-18 + - + Scale with 5 Severity Levels from Very High to Very Low + - + + The criteria for what is considered material damage is based in jurisdictional laws and norms + Something that acts as or causes Material Damage accepted - + 2024-08-16 + + 2022-03-30 + Material Damage - Intentional Misuse - Intentional Misuse - + Harshvardhan J. Pandit + - - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High + + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low - Extremely High Risk (RM7x7 S:7 L:6) + Harshvardhan J. Pandit + 2022-08-17 - Harshvardhan J. Pandit + Low Risk (RM7x7 S:2 L:5) accepted - 2022-08-17 - 0.86,xsd:decimal + 0.20,xsd:decimal - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + + https://www.iso.org/standard/72140.html + IEC 31010:2019 - - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - ENISA Threat Taxonomy 2016 + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + + + Things that cause or have the potential to impact financial resources + accepted + Financial Impact + - - 0.40,xsd:decimal + + Control that monitors another Control + Harshvardhan J. Pandit + Monitor Control + 2024-05-19 + - - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High - High Risk (RM5x5 S:5 L:2) - accepted - 2022-08-17 - + - - 2022-08-18 - + + - The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 - 0.99,xsd:decimal - Level where Risk is Extremely High - accepted - Extremely High Risk - Harshvardhan J. Pandit - + Intentional Misuse + + Intentional Misuse + - - 0.1,xsd:decimal - 2022-08-18 + + - - - Very Low Risk + 2022-08-17 + Low Risk (RM5x5 S:1 L:5) accepted - Level where Risk is Very Low + 0.20,xsd:decimal + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low + Harshvardhan J. Pandit - The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 - - + - - + + Impact to Rights + 2022-08-17 + - + + 2024-08-16 accepted - Unauthorised Activity - Something that acts as or causes Unauthorised Activity - + + Harshvardhan J. Pandit + This concept was called "ImpactToRights" in DPV 2.0 + Something that acts as or causes Impact to Rights + + - - + + Incident Status Unknown + + Harshvardhan J. Pandit + - Public Order Breach - - Harshvardhan J. Pandit accepted - 2024-08-16 - 2022-08-17 - Something that acts as or causes Public Order Breach - - + The status of a incident is unknown + 2024-02-14 + - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 - - - Operational Security Risk + + + + + + + Guides for Data Privacy Vocabulary + + accepted - + 2024-08-16 + - Risks and issues that arise during operational processes - + 2024-04-14 + Georg P. Krog, Harshvardhan J. Pandit + + Something that acts as or provides renumeration which is in monetary or financial form + Remuneration + - + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html + + + ENISA Threat Landscape for Ransomware Attacks 2022 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + Risk Concepts - N3 serialiation + + + + + + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - Harshvardhan J. Pandit - 2024-08-16 - Something that acts as or causes Unauthorised Data Disclosure - Unauthorised Data Disclosure - + + https://www.iso.org/standard/75281.html + + ISO/IEC 27005:2018 + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + 2024-02-14 + + + has vulnerability + + + + accepted + Indicates the associated context (subject) has indicated vulnerability (object) + + + + - - + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate accepted 2022-08-17 - + Harshvardhan J. Pandit + 0.32,xsd:decimal + Moderate Risk (RM5x5 S:2 L:4) + - - Control that removes Impact i.e. prevents it from materialising - accepted + + + Risk Concepts - HTML serialiation + + + + + + + Incident caused due to accidental actions arising from human or human-controlled situations + Accidental Incident + + 2024-05-19 + + + accepted + + - Harshvardhan J. Pandit - Remove Impact + 2024-05-19 + accepted + Recovery Control - + Control to recover from event + - + + 2024-02-14 + Assessment of risk involving its identification, analysis, and evaluation + Risk Assessment + - accepted - 2022-08-17 - 0.16,xsd:decimal - - Harshvardhan J. Pandit - Low Risk (RM5x5 S:1 L:4) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low - - - - ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html - - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - ENISA Methodology for Sectoral Cybersecurity Assessments - - - - ENISA Threat Landscape for Ransomware Attacks 2022 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + accepted + ISO 31073:2022 Risk management vocabulary - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + + https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 + ENISA Threat Landscape 2021 - + + High Risk (RM7x7 S:5 L:4) - Harshvardhan J. Pandit - accepted - High Risk (RM5x5 S:2 L:5) - 0.40,xsd:decimal + Harshvardhan J. Pandit 2022-08-17 - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High - - - - + 0.41,xsd:decimal accepted - Incident Report - - - - 2024-05-19 - Documented information about an incident, its handling, assessments,and notifications - - - - Risk Concepts - HTML serialiation - - - - + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + - + + https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 + ENISA Threat Landscape for Ransomware Attacks 2022 - + - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + https://www.iso.org/standard/72140.html + IEC 31010:2019 - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 + + Risk Matrix 5x5 + + + + accepted + Harshvardhan J. Pandit + A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types + 2022-08-17 + + - + + Something that acts as or causes Child Violence + 2024-08-16 + + + + accepted + + This concept was called "ChildViolence" in DPV 2.0 - Risks and issues that have their basis in legal requirements and enforcement - Legal Risk + Harshvardhan J. Pandit + Violence against children + 2022-08-17 + + + accepted - + Physical Harm + + - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - + + accepted + Risks and issues that have their basis in legal requirements and enforcement + + + + + Legal Risk + - - ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - - Harshvardhan J. Pandit - accepted + - - 2024-05-19 - Monitor Risk - Control that monitors a Risk - - - + + Deliberate Incident + Incident caused due to deliberate actions of a human - Integrity Incident + accepted + + + - Incident where the integrity of information or system has been affected - accepted - 2024-05-19 + + Harshvardhan J. Pandit + This concept was called "ViolationRegulatoryObligations" in DPV 2.0 + modified + Violation of Legal Obligations + Something that acts as or causes Violation of Legal Obligations + 2024-08-16 + 2022-08-17 + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 - - - 2022-08-18 - 0.99,xsd:decimal - + + 2022-08-17 + Harshvardhan J. Pandit + - Harshvardhan J. Pandit + 0.99,xsd:decimal + Extremely High Risk (RM7x7 S:7 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High accepted - The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 - Extremely High Severity - Level where Severity is Extremely High - + - - Incident Ongoing Report - - accepted - - - - 2024-05-19 - A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - accepted - 2024-05-19 + + 2022-08-17 - + + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High + accepted + High Risk (RM7x7 S:3 L:5) + 0.31,xsd:decimal - Monitor Consequence - Control that monitors a Risk Consequence Harshvardhan J. Pandit - + - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ENISA Methodology for Sectoral Cybersecurity Assessments - + + Harshvardhan J. Pandit - High Risk (RM5x5 S:5 L:3) + The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring + - - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High - - 0.60,xsd:decimal + Incident Terminated accepted - 2022-08-17 - + 2024-02-14 + - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + + Cross-Border Incident + + + 2024-05-19 + Incident involving cross-border or multiple jurisdictions + accepted + + - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - Privacy accepted - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - + Operational Security Risk + Risks and issues that arise during operational processes + - - + + + - Harshvardhan J. Pandit - A register recording incidentes, their reports, notifications, and other related activities accepted + Environmental Incident + 2024-05-19 + Incident caused due to environmental factors outside human controls + + + accepted + - Incident Register + User Risks + Concepts associated with risks that arise due to User or Human use + + - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + https://www.iso.org/standard/75281.html + + ISO/IEC 27005:2018 + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + ENISA Threat Taxonomy 2016 + + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + ENISA Reference Incident Classification Taxonomy 2018 + + + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + ENISA Threat Taxonomy 2016 + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + + ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + - ENISA Reference Incident Classification Taxonomy 2018 + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html + + ISO/IEC 27005:2018 + + https://www.iso.org/standard/75281.html - + - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html diff --git a/2.1-dev/risk/risk-owl.ttl b/2.1-dev/risk/risk-owl.ttl index f2342f89c..b6e848bba 100644 --- a/2.1-dev/risk/risk-owl.ttl +++ b/2.1-dev/risk/risk-owl.ttl @@ -143,7 +143,9 @@ risk-owl:AuthorisationFailure a rdfs:Class, schema:name "ENISa Trust Services Security Incidents 2021" ; schema:url "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Authorisation Failure"@en ; skos:prefLabel "Authorisation Failure"@en . @@ -152,7 +154,8 @@ risk-owl:AvailabilityBreach a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:DataBreach ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:DataBreach ; sw:term_status "accepted"@en . risk-owl:AvailabilityIncident a rdfs:Class, @@ -197,7 +200,8 @@ risk-owl:Blackmail a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Blackmail"@en ; skos:prefLabel "Blackmail"@en . @@ -212,7 +216,9 @@ risk-owl:BruteForceAuthorisations a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; skos:prefLabel "Brute Force Authorisations"@en . @@ -249,7 +255,8 @@ risk-owl:Coercion a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Coercion"@en ; skos:prefLabel "Coercion"@en . @@ -270,7 +277,8 @@ risk-owl:ComponentFailure a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Component Failure"@en ; skos:prefLabel "Component Failure"@en ; @@ -280,7 +288,8 @@ risk-owl:ComponentMalfunction a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Component Malfunction"@en ; skos:prefLabel "Component Malfunction"@en ; @@ -296,7 +305,10 @@ risk-owl:CompromiseAccount a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ; skos:prefLabel "Compromise Account"@en . @@ -311,7 +323,8 @@ risk-owl:CompromiseAccountCredentials a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ; skos:prefLabel "Compromise Account Credentials"@en . @@ -326,7 +339,8 @@ risk-owl:ConfidentialityBreach a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:DataBreach ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:DataBreach ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Confidentiality Breach"@en ; skos:prefLabel "Confidentiality Breach"@en . @@ -395,7 +409,8 @@ risk-owl:Cryptojacking a rdfs:Class, schema:name "ENISA Threat Landscape 2021" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Cryptojacking"@en ; skos:prefLabel "Cryptojacking"@en . @@ -424,7 +439,10 @@ risk-owl:DataBreach a rdfs:Class, vann:example dex-owl:E0069, dex-owl:E0071 ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SecurityBreach ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:SecurityBreach ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Data Breach"@en ; skos:prefLabel "Data Breach"@en . @@ -439,7 +457,8 @@ risk-owl:DataCorruption a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:IntegrityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Corruption of Data"@en ; skos:prefLabel "Data Corruption"@en ; @@ -461,13 +480,11 @@ risk-owl:DenialServiceAttack a rdfs:Class, dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ], - [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ; skos:prefLabel "Denial of Service Attack (DoS)"@en . @@ -516,7 +533,8 @@ risk-owl:DistributedDenialServiceAttack a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ; skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en . @@ -549,7 +567,8 @@ risk-owl:EquipmentFailure a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Equipment Failure"@en ; skos:prefLabel "Equipment Failure"@en ; @@ -565,7 +584,8 @@ risk-owl:EquipmentMalfunction a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Equipment Malfunction"@en ; skos:prefLabel "Equipment Malfunction"@en ; @@ -621,7 +641,8 @@ risk-owl:Extorsion a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Extorsion"@en ; skos:prefLabel "Extorsion"@en . @@ -751,7 +772,8 @@ risk-owl:Fraud a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Fraud"@en ; skos:prefLabel "Fraud"@en . @@ -860,7 +882,8 @@ risk-owl:IdentityFraud a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Identity Fraud"@en ; skos:prefLabel "Identity Fraud"@en . @@ -875,7 +898,8 @@ risk-owl:IdentityTheft a rdfs:Class, schema:name "ENISA Threat Taxonomy 2016" ; schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Identity Theft"@en ; skos:prefLabel "Identity Theft"@en . @@ -1175,7 +1199,8 @@ risk-owl:IntegrityBreach a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:DataBreach ; + rdfs:subClassOf risk-owl:DataBreach, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en . risk-owl:IntegrityIncident a rdfs:Class, @@ -1206,21 +1231,13 @@ risk-owl:InterceptCommunications a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "modified"@en ; skos:definition "Something that acts as or causes Interception of Communications"@en ; skos:prefLabel "Intercept Communications"@en ; skos:scopeNote "This concept was called \"InterceptionCommunications\" in DPV 2.0"@en . -risk-owl:InternalSecurityThreat a rdfs:Class, - owl:Class, - dpv-owl:RiskConcept ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:RiskConcept ; - sw:term_status "accepted"@en ; - skos:definition "Concepts associated with security threats and issues that originate within the organisation"@en ; - skos:prefLabel "Internal Security Threat"@en . - risk-owl:JudicialCosts a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; @@ -1408,7 +1425,10 @@ risk-owl:MaliciousCodeAttack a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Malicious Code Attack"@en ; skos:prefLabel "Malicious Code Attack"@en . @@ -1423,7 +1443,10 @@ risk-owl:MalwareAttack a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Malware Attack"@en ; skos:prefLabel "Malware Attack"@en . @@ -1635,7 +1658,8 @@ risk-owl:PhishingScam a rdfs:Class, schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Phishing Scam"@en ; skos:prefLabel "Phishing Scam"@en . @@ -2746,7 +2770,8 @@ risk-owl:Reidentification a rdfs:Class, dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Re-identification"@en ; skos:prefLabel "Re-identification"@en ; @@ -2994,7 +3019,9 @@ risk-owl:Sabotage a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Sabotage"@en ; skos:prefLabel "Sabotage"@en . @@ -3009,7 +3036,8 @@ risk-owl:Scam a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Scam"@en ; skos:prefLabel "Scam"@en . @@ -3018,7 +3046,10 @@ risk-owl:SecurityAttack a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ; skos:prefLabel "Security Attack"@en . @@ -3033,7 +3064,10 @@ risk-owl:SecurityBreach a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:IntegrityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Security Breach"@en ; skos:prefLabel "Security Breach"@en . @@ -3117,7 +3151,9 @@ risk-owl:Spoofing a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat, + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept, risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Spoofing"@en ; @@ -3133,7 +3169,8 @@ risk-owl:SystemFailure a rdfs:Class, schema:name "ENISA Threat Landscape for Ransomware Attacks 2022" ; schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes System Failure"@en ; skos:prefLabel "System Failure"@en ; @@ -3149,7 +3186,10 @@ risk-owl:SystemIntrusion a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes System Intrusion"@en ; skos:prefLabel "System Intrusion"@en . @@ -3164,7 +3204,8 @@ risk-owl:SystemMalfunction a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:OperationalSecurityRisk ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes System Malfunction"@en ; skos:prefLabel "System Malfunction"@en ; @@ -3213,7 +3254,10 @@ risk-owl:UnauthorisedAccesstoPremises a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ; skos:prefLabel "Unauthorised Access to Premises"@en . @@ -3222,7 +3266,10 @@ risk-owl:UnauthorisedActivity a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Activity"@en ; skos:prefLabel "Unauthorised Activity"@en . @@ -3237,7 +3284,9 @@ risk-owl:UnauthorisedCodeAccess a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Code Access"@en ; skos:prefLabel "Unauthorised Code Access"@en . @@ -3252,7 +3301,8 @@ risk-owl:UnauthorisedCodeDisclosure a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ; skos:prefLabel "Unauthorised Code Disclosure"@en . @@ -3267,7 +3317,8 @@ risk-owl:UnauthorisedCodeModification a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ; skos:prefLabel "Unauthorised Code Modification"@en . @@ -3282,7 +3333,8 @@ risk-owl:UnauthorisedDataAccess a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Data Access"@en ; skos:prefLabel "Unauthorised Data Access"@en . @@ -3297,7 +3349,8 @@ risk-owl:UnauthorisedDataDisclosure a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ; skos:prefLabel "Unauthorised Data Disclosure"@en . @@ -3312,7 +3365,8 @@ risk-owl:UnauthorisedDataModification a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ; skos:prefLabel "Unauthorised Data Modification"@en . @@ -3327,7 +3381,8 @@ risk-owl:UnauthorisedInformationDisclosure a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ; skos:prefLabel "Unauthorised Information Disclosure"@en . @@ -3339,7 +3394,8 @@ risk-owl:UnauthorisedReidentification a rdfs:Class, dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ; skos:prefLabel "Unauthorised Re-Identification"@en . @@ -3354,7 +3410,8 @@ risk-owl:UnauthorisedResourceUse a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ; skos:prefLabel "Unauthorised Resource Use"@en . @@ -3369,7 +3426,9 @@ risk-owl:UnauthorisedSystemAccess a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised System Access"@en ; skos:prefLabel "Unauthorised System Access"@en . @@ -3384,7 +3443,8 @@ risk-owl:UnauthorisedSystemModification a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unauthorised System Modification"@en ; skos:prefLabel "Unauthorised System Modification"@en . @@ -3399,7 +3459,9 @@ risk-owl:UnwantedCodeDeletion a rdfs:Class, schema:name "ENISA Methodology for Sectoral Cybersecurity Assessments" ; schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ; skos:prefLabel "Unwanted Code Deletion"@en . @@ -3414,7 +3476,9 @@ risk-owl:UnwantedDataDeletion a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:AvailabilityConcept, + risk-owl:ExternalSecurityThreat, + risk-owl:IntegrityConcept ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ; skos:prefLabel "Unwanted Data Deletion"@en . @@ -3429,7 +3493,8 @@ risk-owl:UnwantedDisclosureData a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ExternalSecurityThreat ; + rdfs:subClassOf risk-owl:ConfidentialityConcept, + risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ; skos:prefLabel "Unwanted Disclosure of Data"@en . @@ -3641,21 +3706,6 @@ risk-owl:Vulnerability a rdfs:Class, skos:definition "Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk"@en ; skos:prefLabel "Vulnerability"@en . -risk-owl:VulnerabilityCreated a rdfs:Class, - owl:Class, - dpv-owl:RiskConcept ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:modified "2024-08-16"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:InternalSecurityThreat ; - sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Vulnerability Created"@en ; - skos:prefLabel "Vulnerability Created"@en . - risk-owl:causedByThreat a rdf:Property, owl:ObjectProperty ; dcam:rangeIncludes risk-owl:Threat ; diff --git a/2.1-dev/risk/risk.csv b/2.1-dev/risk/risk.csv index 96ed050f9..eaeac3060 100644 --- a/2.1-dev/risk/risk.csv +++ b/2.1-dev/risk/risk.csv @@ -10,44 +10,44 @@ term,type,iri,label,definition,dpvtype,subclassof,hasbroader,scopenote,created,m 7SeverityLevels,class,https://w3id.org/dpv/risk#7SeverityLevels,7 Severity Levels,Scale with 7 Severity Levels from Extremely High to Extremely Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv#Severity,,2022-08-18,,risk,https://w3id.org/dpv/risk AccidentalIncident,class,https://w3id.org/dpv/risk#AccidentalIncident,Accidental Incident,Incident caused due to accidental actions arising from human or human-controlled situations,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk AccidentalMisuse,class,https://w3id.org/dpv/risk#AccidentalMisuse,Accidental Misuse,Accidental Misuse,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,,,risk,https://w3id.org/dpv/risk -AuthorisationFailure,class,https://w3id.org/dpv/risk#AuthorisationFailure,Authorisation Failure,Something that acts as or causes Authorisation Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +AuthorisationFailure,class,https://w3id.org/dpv/risk#AuthorisationFailure,Authorisation Failure,Something that acts as or causes Authorisation Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk AvailabilityIncident,class,https://w3id.org/dpv/risk#AvailabilityIncident,Availability Incident,Incident where the availability of information or system has been affected,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk AvoidSource,class,https://w3id.org/dpv/risk#AvoidSource,Avoid Source,Control that avoids the risk source,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#SourceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk Benefit,class,https://w3id.org/dpv/risk#Benefit,Benefit,Something that acts as or causes benefits,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2022-03-23,2024-08-16,risk,https://w3id.org/dpv/risk -Blackmail,class,https://w3id.org/dpv/risk#Blackmail,Blackmail,Something that acts as or causes Blackmail,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -BruteForceAuthorisations,class,https://w3id.org/dpv/risk#BruteForceAuthorisations,Brute Force Authorisations,Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Blackmail,class,https://w3id.org/dpv/risk#Blackmail,Blackmail,Something that acts as or causes Blackmail,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +BruteForceAuthorisations,class,https://w3id.org/dpv/risk#BruteForceAuthorisations,Brute Force Authorisations,Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ChangeConsequence,class,https://w3id.org/dpv/risk#ChangeConsequence,Change Consequence,Control that changes Consequence,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ConsequenceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk ChangeImpact,class,https://w3id.org/dpv/risk#ChangeImpact,Change Impact,Control that changes Impact,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ImpactControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -Coercion,class,https://w3id.org/dpv/risk#Coercion,Coercion,Something that acts as or causes Coercion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Coercion,class,https://w3id.org/dpv/risk#Coercion,Coercion,Something that acts as or causes Coercion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk Compensation,class,https://w3id.org/dpv/risk#Compensation,Compensation,Something that acts as or provides compensation - which can be monetary and financial or in other forms,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk -ComponentFailure,class,https://w3id.org/dpv/risk#ComponentFailure,Component Failure,Something that acts as or causes Component Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk -ComponentMalfunction,class,https://w3id.org/dpv/risk#ComponentMalfunction,Component Malfunction,Something that acts as or causes Component Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk -CompromiseAccount,class,https://w3id.org/dpv/risk#CompromiseAccount,Compromise Account,Something that acts as or causes a compromised account that is then used by the compromiser,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -CompromiseAccountCredentials,class,https://w3id.org/dpv/risk#CompromiseAccountCredentials,Compromise Account Credentials,Something that acts as or causes Account Credentials to be compromised,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -ConfidentialityBreach,class,https://w3id.org/dpv/risk#ConfidentialityBreach,Confidentiality Breach,Something that acts as or causes Confidentiality Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#DataBreach,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ComponentFailure,class,https://w3id.org/dpv/risk#ComponentFailure,Component Failure,Something that acts as or causes Component Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk +ComponentMalfunction,class,https://w3id.org/dpv/risk#ComponentMalfunction,Component Malfunction,Something that acts as or causes Component Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk +CompromiseAccount,class,https://w3id.org/dpv/risk#CompromiseAccount,Compromise Account,Something that acts as or causes a compromised account that is then used by the compromiser,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +CompromiseAccountCredentials,class,https://w3id.org/dpv/risk#CompromiseAccountCredentials,Compromise Account Credentials,Something that acts as or causes Account Credentials to be compromised,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ConfidentialityBreach,class,https://w3id.org/dpv/risk#ConfidentialityBreach,Confidentiality Breach,Something that acts as or causes Confidentiality Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#DataBreach,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ConfidentialityIncident,class,https://w3id.org/dpv/risk#ConfidentialityIncident,Confidentiality Incident,Incident where the confidentiality of information or system has been affected,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk ConsequenceControl,class,https://w3id.org/dpv/risk#ConsequenceControl,Consequence Control,Risk Mitigation Measure that controls the Consequences,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk ContainmentControl,class,https://w3id.org/dpv/risk#ContainmentControl,Containment Control,Control to contain event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk CopyrightViolation,class,https://w3id.org/dpv/risk#CopyrightViolation,Copyright Violation,Something that acts as or causes Copyright Violation,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk CrossBorderIncident,class,https://w3id.org/dpv/risk#CrossBorderIncident,Cross-Border Incident,Incident involving cross-border or multiple jurisdictions,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk -Cryptojacking,class,https://w3id.org/dpv/risk#Cryptojacking,Cryptojacking,Something that acts as or causes Cryptojacking,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Cryptojacking,class,https://w3id.org/dpv/risk#Cryptojacking,Cryptojacking,Something that acts as or causes Cryptojacking,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk Damage,class,https://w3id.org/dpv/risk#Damage,Damage,Something that acts as or causes Damage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk -DataBreach,class,https://w3id.org/dpv/risk#DataBreach,Data Breach,Something that acts as or causes Data Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SecurityBreach,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -DataCorruption,class,https://w3id.org/dpv/risk#DataCorruption,Data Corruption,Something that acts as or causes Corruption of Data,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,"This concept was called ""Corruption Data"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +DataBreach,class,https://w3id.org/dpv/risk#DataBreach,Data Breach,Something that acts as or causes Data Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#SecurityBreach,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +DataCorruption,class,https://w3id.org/dpv/risk#DataCorruption,Data Corruption,Something that acts as or causes Corruption of Data,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,"This concept was called ""Corruption Data"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk DeliberateIncident,class,https://w3id.org/dpv/risk#DeliberateIncident,Deliberate Incident,Incident caused due to deliberate actions of a human,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk -DenialServiceAttack,class,https://w3id.org/dpv/risk#DenialServiceAttack,Denial of Service Attack (DoS),Something that acts as or causes Denial of Service Attack (DoS),https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +DenialServiceAttack,class,https://w3id.org/dpv/risk#DenialServiceAttack,Denial of Service Attack (DoS),Something that acts as or causes Denial of Service Attack (DoS),https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk DetectionControl,class,https://w3id.org/dpv/risk#DetectionControl,Detection Control,Control to detect event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk Detriment,class,https://w3id.org/dpv/risk#Detriment,Detriment,Something that acts as or causes Detriment,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-03-23,2024-08-16,risk,https://w3id.org/dpv/risk Discrimination,class,https://w3id.org/dpv/risk#Discrimination,Discrimination,Something that acts as or causes Discrimination,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk -DistributedDenialServiceAttack,class,https://w3id.org/dpv/risk#DistributedDenialServiceAttack,Distributed Denial of Service Attack (DDoS),Something that acts as or causes Distributed Denial of Service Attack (DDoS),https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +DistributedDenialServiceAttack,class,https://w3id.org/dpv/risk#DistributedDenialServiceAttack,Distributed Denial of Service Attack (DDoS),Something that acts as or causes Distributed Denial of Service Attack (DDoS),https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk EnvironmentalIncident,class,https://w3id.org/dpv/risk#EnvironmentalIncident,Environmental Incident,Incident caused due to environmental factors outside human controls,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk EnvironmentalRisk,class,https://w3id.org/dpv/risk#EnvironmentalRisk,Environmental Risk,Risks and issues that have their origin in environment or can affect the environment at large,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk -EquipmentFailure,class,https://w3id.org/dpv/risk#EquipmentFailure,Equipment Failure,Something that acts as or causes Equipment Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -EquipmentMalfunction,class,https://w3id.org/dpv/risk#EquipmentMalfunction,Equipment Malfunction,Something that acts as or causes Equipment Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +EquipmentFailure,class,https://w3id.org/dpv/risk#EquipmentFailure,Equipment Failure,Something that acts as or causes Equipment Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +EquipmentMalfunction,class,https://w3id.org/dpv/risk#EquipmentMalfunction,Equipment Malfunction,Something that acts as or causes Equipment Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ErroneousSystemUse,class,https://w3id.org/dpv/risk#ErroneousSystemUse,Erroneous System Use,Something that acts as or causes Erroneous System Use,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ExposureToHarmfulSpeech,class,https://w3id.org/dpv/risk#ExposureToHarmfulSpeech,Exposure to Harmful Speech,Something that acts as or causes Harmful Speech,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""HarmfulSpeech"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ExternalSecurityThreat,class,https://w3id.org/dpv/risk#ExternalSecurityThreat,External Security Threat,Concepts associated with security threats that are likely to originate externally,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk -Extorsion,class,https://w3id.org/dpv/risk#Extorsion,Extorsion,Something that acts as or causes Extorsion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Extorsion,class,https://w3id.org/dpv/risk#Extorsion,Extorsion,Something that acts as or causes Extorsion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ExtremelyHighLikelihood,class,https://w3id.org/dpv/risk#ExtremelyHighLikelihood,Extremely High Likelihood,Level where Likelihood is Extremely High,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk ExtremelyHighRisk,class,https://w3id.org/dpv/risk#ExtremelyHighRisk,Extremely High Risk,Level where Risk is Extremely High,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#7RiskLevels,The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk ExtremelyHighSeverity,class,https://w3id.org/dpv/risk#ExtremelyHighSeverity,Extremely High Severity,Level where Severity is Extremely High,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk @@ -57,16 +57,16 @@ ExtremelyLowSeverity,class,https://w3id.org/dpv/risk#ExtremelyLowSeverity,Extrem Fee,class,https://w3id.org/dpv/risk#Fee,Fee,Something that acts as or provides fees e.g. for using a service,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk FinancialImpact,class,https://w3id.org/dpv/risk#FinancialImpact,Financial Impact,Things that cause or have the potential to impact financial resources,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk FinancialLoss,class,https://w3id.org/dpv/risk#FinancialLoss,Financial Loss,Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -Fraud,class,https://w3id.org/dpv/risk#Fraud,Fraud,Something that acts as or causes Fraud,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Fraud,class,https://w3id.org/dpv/risk#Fraud,Fraud,Something that acts as or causes Fraud,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk HaltSource,class,https://w3id.org/dpv/risk#HaltSource,Halt Source,Control that halts the risk source or prevents it from materialising,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#SourceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk Harm,class,https://w3id.org/dpv/risk#Harm,Harm,Something that acts as or causes Harm to humans,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,This concept refers to the general abstract notion of harm,2022-08-13,2024-08-16,risk,https://w3id.org/dpv/risk HighLikelihood,class,https://w3id.org/dpv/risk#HighLikelihood,High Likelihood,Level where Likelihood is High,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#3LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -HighRisk,class,https://w3id.org/dpv/risk#HighRisk,High Risk,Level where Risk is High,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#3RiskLevels;https://w3id.org/dpv/risk#7RiskLevels;https://w3id.org/dpv/risk#5RiskLevels,The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -HighSeverity,class,https://w3id.org/dpv/risk#HighSeverity,High Severity,Level where Severity is High,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#3SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +HighRisk,class,https://w3id.org/dpv/risk#HighRisk,High Risk,Level where Risk is High,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#3RiskLevels;https://w3id.org/dpv/risk#5RiskLevels;https://w3id.org/dpv/risk#7RiskLevels,The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +HighSeverity,class,https://w3id.org/dpv/risk#HighSeverity,High Severity,Level where Severity is High,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels;https://w3id.org/dpv/risk#3SeverityLevels,The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk HumanErrors,class,https://w3id.org/dpv/risk#HumanErrors,Human Errors,Something that acts as or causes Human Errors,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk IdentificationControl,class,https://w3id.org/dpv/risk#IdentificationControl,Identification Control,Control to identify characteristics of event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -IdentityFraud,class,https://w3id.org/dpv/risk#IdentityFraud,Identity Fraud,Something that acts as or causes Identity Fraud,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -IdentityTheft,class,https://w3id.org/dpv/risk#IdentityTheft,Identity Theft,Something that acts as or causes Identity Theft,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +IdentityFraud,class,https://w3id.org/dpv/risk#IdentityFraud,Identity Fraud,Something that acts as or causes Identity Fraud,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +IdentityTheft,class,https://w3id.org/dpv/risk#IdentityTheft,Identity Theft,Something that acts as or causes Identity Theft,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk IllegalDataProcessing,class,https://w3id.org/dpv/risk#IllegalDataProcessing,Illegal Data Processing,Something that acts as or causes Illegal Processing of Data,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""IllegalProcessingData"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ImpactControl,class,https://w3id.org/dpv/risk#ImpactControl,Impact Control,Risk Mitigation Measure that controls Impacts,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk Incident,class,https://w3id.org/dpv/risk#Incident,Incident,An actual or occured event,,https://w3id.org/dpv#RiskConcept,https://w3id.org/dpv#RiskConcept,Incident is realised or materialised risk,2024-02-14,2024-08-16,risk,https://w3id.org/dpv/risk @@ -97,8 +97,7 @@ IndividualRisk,class,https://w3id.org/dpv/risk#IndividualRisk,Individual Risk,Ri Injury,class,https://w3id.org/dpv/risk#Injury,Injury,Something that acts as or causes Injury,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk IntegrityIncident,class,https://w3id.org/dpv/risk#IntegrityIncident,Integrity Incident,Incident where the integrity of information or system has been affected,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk IntentionalMisuse,class,https://w3id.org/dpv/risk#IntentionalMisuse,Intentional Misuse,Intentional Misuse,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,,,risk,https://w3id.org/dpv/risk -InterceptCommunications,class,https://w3id.org/dpv/risk#InterceptCommunications,Intercept Communications,Something that acts as or causes Interception of Communications,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,"This concept was called ""InterceptionCommunications"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -InternalSecurityThreat,class,https://w3id.org/dpv/risk#InternalSecurityThreat,Internal Security Threat,Concepts associated with security threats and issues that originate within the organisation,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk +InterceptCommunications,class,https://w3id.org/dpv/risk#InterceptCommunications,Intercept Communications,Something that acts as or causes Interception of Communications,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,"This concept was called ""InterceptionCommunications"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk JudicialCosts,class,https://w3id.org/dpv/risk#JudicialCosts,Judicial Costs,Something that involves or causes judicial costs to be paid,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,,,risk,https://w3id.org/dpv/risk JudicialPenalty,class,https://w3id.org/dpv/risk#JudicialPenalty,Judicial Penalty,Something that involves or causes judicial penalties to be paid,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,,,risk,https://w3id.org/dpv/risk LegalRisk,class,https://w3id.org/dpv/risk#LegalRisk,Legal Risk,Risks and issues that have their basis in legal requirements and enforcement,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk @@ -110,15 +109,15 @@ LoseOpportunity,class,https://w3id.org/dpv/risk#LoseOpportunity,Lose of Opportun LoseReputation,class,https://w3id.org/dpv/risk#LoseReputation,Lose of Reputation,Something that acts as or causes Loss of Reputation,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk LoseTrust,class,https://w3id.org/dpv/risk#LoseTrust,Lose of Trust,Something that acts as or causes Loss of Trust,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk LowLikelihood,class,https://w3id.org/dpv/risk#LowLikelihood,Low Likelihood,Level where Likelihood is Low,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#3LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -LowRisk,class,https://w3id.org/dpv/risk#LowRisk,Low Risk,Level where Risk is Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#3RiskLevels;https://w3id.org/dpv/risk#7RiskLevels;https://w3id.org/dpv/risk#5RiskLevels,The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -LowSeverity,class,https://w3id.org/dpv/risk#LowSeverity,Low Severity,Level where Severity is Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#3SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -MaliciousCodeAttack,class,https://w3id.org/dpv/risk#MaliciousCodeAttack,Malicious Code Attack,Something that acts as or causes Malicious Code Attack,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -MalwareAttack,class,https://w3id.org/dpv/risk#MalwareAttack,Malware Attack,Something that acts as or causes Malware Attack,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +LowRisk,class,https://w3id.org/dpv/risk#LowRisk,Low Risk,Level where Risk is Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#3RiskLevels;https://w3id.org/dpv/risk#5RiskLevels;https://w3id.org/dpv/risk#7RiskLevels,The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +LowSeverity,class,https://w3id.org/dpv/risk#LowSeverity,Low Severity,Level where Severity is Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels;https://w3id.org/dpv/risk#3SeverityLevels,The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +MaliciousCodeAttack,class,https://w3id.org/dpv/risk#MaliciousCodeAttack,Malicious Code Attack,Something that acts as or causes Malicious Code Attack,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +MalwareAttack,class,https://w3id.org/dpv/risk#MalwareAttack,Malware Attack,Something that acts as or causes Malware Attack,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk MaterialDamage,class,https://w3id.org/dpv/risk#MaterialDamage,Material Damage,Something that acts as or causes Material Damage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,The criteria for what is considered material damage is based in jurisdictional laws and norms,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk Misuse,class,https://w3id.org/dpv/risk#Misuse,Misuse,Something that acts as or causes Misuse,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,2024-06-11,2024-08-16,risk,https://w3id.org/dpv/risk ModerateLikelihood,class,https://w3id.org/dpv/risk#ModerateLikelihood,Moderate Likelihood,Level where Likelihood is Moderate,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#3LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -ModerateRisk,class,https://w3id.org/dpv/risk#ModerateRisk,Moderate Risk,Level where Risk is Moderate,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#3RiskLevels;https://w3id.org/dpv/risk#7RiskLevels;https://w3id.org/dpv/risk#5RiskLevels,The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -ModerateSeverity,class,https://w3id.org/dpv/risk#ModerateSeverity,Moderate Severity,Level where Severity is Moderate,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#3SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +ModerateRisk,class,https://w3id.org/dpv/risk#ModerateRisk,Moderate Risk,Level where Risk is Moderate,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#3RiskLevels;https://w3id.org/dpv/risk#5RiskLevels;https://w3id.org/dpv/risk#7RiskLevels,The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +ModerateSeverity,class,https://w3id.org/dpv/risk#ModerateSeverity,Moderate Severity,Level where Severity is Moderate,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels;https://w3id.org/dpv/risk#3SeverityLevels,The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk MonitorConsequence,class,https://w3id.org/dpv/risk#MonitorConsequence,Monitor Consequence,Control that monitors a Risk Consequence,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#MonitorControl,,2024-05-19,,risk,https://w3id.org/dpv/risk MonitorControl,class,https://w3id.org/dpv/risk#MonitorControl,Monitor Control,Risk Mitigation Measure that uses controls to monitor events,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,"Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.",2024-05-19,,risk,https://w3id.org/dpv/risk MonitorImpact,class,https://w3id.org/dpv/risk#MonitorImpact,Monitor Impact,Control that monitors a Risk Impact,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#MonitorControl,,2024-05-19,,risk,https://w3id.org/dpv/risk @@ -130,7 +129,7 @@ NonMaterialDamage,class,https://w3id.org/dpv/risk#NonMaterialDamage,Non-Material OperationalSecurityRisk,class,https://w3id.org/dpv/risk#OperationalSecurityRisk,Operational Security Risk,Risks and issues that arise during operational processes,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk Payment,class,https://w3id.org/dpv/risk#Payment,Payment,Something that acts as or provides payment e.g. to access a service or purchase resources,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk PersonalSafetyEndangerment,class,https://w3id.org/dpv/risk#PersonalSafetyEndangerment,Personal Safety Endangerment,Something that acts as or causes Personal Safety Endangerment,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -PhishingScam,class,https://w3id.org/dpv/risk#PhishingScam,Phishing Scam,Something that acts as or causes Phishing Scam,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +PhishingScam,class,https://w3id.org/dpv/risk#PhishingScam,Phishing Scam,Something that acts as or causes Phishing Scam,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk PhysicalAssault,class,https://w3id.org/dpv/risk#PhysicalAssault,Physical Assault,Something that acts as or causes Physical Assault,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk PhysicalHarm,class,https://w3id.org/dpv/risk#PhysicalHarm,Physical Harm,,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,,,risk,https://w3id.org/dpv/risk Privacy,class,https://w3id.org/dpv/risk#Privacy,Privacy,,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,,,risk,https://w3id.org/dpv/risk @@ -223,7 +222,7 @@ RecoveryControl,class,https://w3id.org/dpv/risk#RecoveryControl,Recovery Control ReduceLikelihood,class,https://w3id.org/dpv/risk#ReduceLikelihood,Reduce Likelihood,Control that reduces the likelihood of an event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ReductionControl,,2024-05-19,,risk,https://w3id.org/dpv/risk ReduceSeverity,class,https://w3id.org/dpv/risk#ReduceSeverity,Reduce Severity,Control that reduces the severity of an event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ReductionControl,,2024-05-19,,risk,https://w3id.org/dpv/risk ReductionControl,class,https://w3id.org/dpv/risk#ReductionControl,Reduction Control,Control that reduces the likelihood or severity of an event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -Reidentification,class,https://w3id.org/dpv/risk#Reidentification,Re-identification,Something that acts as or causes Re-identification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk +Reidentification,class,https://w3id.org/dpv/risk#Reidentification,Re-identification,Something that acts as or causes Re-identification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk RemedyControl,class,https://w3id.org/dpv/risk#RemedyControl,Remedy Control,Control to remedy consequences of event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk RemoveConsequence,class,https://w3id.org/dpv/risk#RemoveConsequence,Remove Consequence,Control that removes Consequence i.e. prevents it from materialising,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ConsequenceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk RemoveImpact,class,https://w3id.org/dpv/risk#RemoveImpact,Remove Impact,Control that removes Impact i.e. prevents it from materialising,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ImpactControl,,2024-05-19,,risk,https://w3id.org/dpv/risk @@ -244,45 +243,45 @@ RiskMatrix3x3,class,https://w3id.org/dpv/risk#RiskMatrix3x3,Risk Matrix 3x3,"A R RiskMatrix5x5,class,https://w3id.org/dpv/risk#RiskMatrix5x5,Risk Matrix 5x5,"A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types",https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix,,2022-08-17,,risk,https://w3id.org/dpv/risk RiskMatrix7x7,class,https://w3id.org/dpv/risk#RiskMatrix7x7,Risk Matrix 7x7,"A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types",https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix,,2022-08-17,,risk,https://w3id.org/dpv/risk RiskSource,class,https://w3id.org/dpv/risk#RiskSource,Risk Source,"The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk",,https://w3id.org/dpv#RiskConcept,https://w3id.org/dpv#RiskConcept,,2024-02-14,2024-08-16,risk,https://w3id.org/dpv/risk -Sabotage,class,https://w3id.org/dpv/risk#Sabotage,Sabotage,Something that acts as or causes Sabotage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -Scam,class,https://w3id.org/dpv/risk#Scam,Scam,Something that acts as or causes Scam,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -SecurityAttack,class,https://w3id.org/dpv/risk#SecurityAttack,Security Attack,Something that acts as or causes an attack on security with the aim of undermining it,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk -SecurityBreach,class,https://w3id.org/dpv/risk#SecurityBreach,Security Breach,Something that acts as or causes Security Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Sabotage,class,https://w3id.org/dpv/risk#Sabotage,Sabotage,Something that acts as or causes Sabotage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Scam,class,https://w3id.org/dpv/risk#Scam,Scam,Something that acts as or causes Scam,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SecurityAttack,class,https://w3id.org/dpv/risk#SecurityAttack,Security Attack,Something that acts as or causes an attack on security with the aim of undermining it,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk +SecurityBreach,class,https://w3id.org/dpv/risk#SecurityBreach,Security Breach,Something that acts as or causes Security Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk SexualViolence,class,https://w3id.org/dpv/risk#SexualViolence,Sexual Violence,Something that acts as or causes Sexual Violence,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ShareRisk,class,https://w3id.org/dpv/risk#ShareRisk,Share Risk,Risk Mitigation Measure that shares Risk e.g. amongst stakeholders,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk SocialDisadvantage,class,https://w3id.org/dpv/risk#SocialDisadvantage,Social Disadvantage,Something that acts as or causes Social Disadvantage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk SocietalHealthSafety,class,https://w3id.org/dpv/risk#SocietalHealthSafety,Societal Health & Safety,,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,,,risk,https://w3id.org/dpv/risk SocietalRisk,class,https://w3id.org/dpv/risk#SocietalRisk,Societal Risk,Risks and issues that affect or have the potential to affect society at large or specific groups in society,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk SourceControl,class,https://w3id.org/dpv/risk#SourceControl,Source Control,Risk Mitigation Measure that controls the Source,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -Spoofing,class,https://w3id.org/dpv/risk#Spoofing,Spoofing,Something that acts as or causes Spoofing,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -SystemFailure,class,https://w3id.org/dpv/risk#SystemFailure,System Failure,Something that acts as or causes System Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -SystemIntrusion,class,https://w3id.org/dpv/risk#SystemIntrusion,System Intrusion,Something that acts as or causes System Intrusion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -SystemMalfunction,class,https://w3id.org/dpv/risk#SystemMalfunction,System Malfunction,Something that acts as or causes System Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Spoofing,class,https://w3id.org/dpv/risk#Spoofing,Spoofing,Something that acts as or causes Spoofing,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SystemFailure,class,https://w3id.org/dpv/risk#SystemFailure,System Failure,Something that acts as or causes System Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SystemIntrusion,class,https://w3id.org/dpv/risk#SystemIntrusion,System Intrusion,Something that acts as or causes System Intrusion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SystemMalfunction,class,https://w3id.org/dpv/risk#SystemMalfunction,System Malfunction,Something that acts as or causes System Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk Terrorism,class,https://w3id.org/dpv/risk#Terrorism,Terrorism,Something that acts as or causes Terrorism,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk Threat,class,https://w3id.org/dpv/risk#Threat,Threat,Risk source event which causes Risk,,https://w3id.org/dpv/risk#RiskSource,https://w3id.org/dpv/risk#RiskSource,,2024-02-14,,risk,https://w3id.org/dpv/risk ThreatSource,class,https://w3id.org/dpv/risk#ThreatSource,Threat Source,"Source of threat event, including both agent and non-agent sources",,,,,2024-02-14,,risk,https://w3id.org/dpv/risk -UnauthorisedAccesstoPremises,class,https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises,Unauthorised Access to Premises,Something that acts as or causes Unauthorised Access to Premises,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedActivity,class,https://w3id.org/dpv/risk#UnauthorisedActivity,Unauthorised Activity,Something that acts as or causes Unauthorised Activity,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk -UnauthorisedCodeAccess,class,https://w3id.org/dpv/risk#UnauthorisedCodeAccess,Unauthorised Code Access,Something that acts as or causes Unauthorised Code Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedCodeDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure,Unauthorised Code Disclosure,Something that acts as or causes Unauthorised Code Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedCodeModification,class,https://w3id.org/dpv/risk#UnauthorisedCodeModification,Unauthorised Code Modification,Something that acts as or causes Unauthorised Code Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedDataAccess,class,https://w3id.org/dpv/risk#UnauthorisedDataAccess,Unauthorised Data Access,Something that acts as or causes Unauthorised Data Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedDataDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedDataDisclosure,Unauthorised Data Disclosure,Something that acts as or causes Unauthorised Data Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedDataModification,class,https://w3id.org/dpv/risk#UnauthorisedDataModification,Unauthorised Data Modification,Something that acts as or causes Unauthorised Data Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedInformationDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure,Unauthorised Information Disclosure,Something that acts as or causes Unauthorised Information Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedReidentification,class,https://w3id.org/dpv/risk#UnauthorisedReidentification,Unauthorised Re-Identification,Something that acts as or causes Unauthorised Re-Identification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedResourceUse,class,https://w3id.org/dpv/risk#UnauthorisedResourceUse,Unauthorised Resource Use,Something that acts as or causes Unauthorised Resource Use,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedSystemAccess,class,https://w3id.org/dpv/risk#UnauthorisedSystemAccess,Unauthorised System Access,Something that acts as or causes Unauthorised System Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedSystemModification,class,https://w3id.org/dpv/risk#UnauthorisedSystemModification,Unauthorised System Modification,Something that acts as or causes Unauthorised System Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnwantedCodeDeletion,class,https://w3id.org/dpv/risk#UnwantedCodeDeletion,Unwanted Code Deletion,Something that acts as or causes Unwanted Code Deletion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnwantedDataDeletion,class,https://w3id.org/dpv/risk#UnwantedDataDeletion,Unwanted Data Deletion,Something that acts as or causes Unwanted Data Deletion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnwantedDisclosureData,class,https://w3id.org/dpv/risk#UnwantedDisclosureData,Unwanted Disclosure of Data,Something that acts as or causes Unwanted Disclosure of Data,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedAccesstoPremises,class,https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises,Unauthorised Access to Premises,Something that acts as or causes Unauthorised Access to Premises,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedActivity,class,https://w3id.org/dpv/risk#UnauthorisedActivity,Unauthorised Activity,Something that acts as or causes Unauthorised Activity,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk +UnauthorisedCodeAccess,class,https://w3id.org/dpv/risk#UnauthorisedCodeAccess,Unauthorised Code Access,Something that acts as or causes Unauthorised Code Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedCodeDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure,Unauthorised Code Disclosure,Something that acts as or causes Unauthorised Code Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedCodeModification,class,https://w3id.org/dpv/risk#UnauthorisedCodeModification,Unauthorised Code Modification,Something that acts as or causes Unauthorised Code Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedDataAccess,class,https://w3id.org/dpv/risk#UnauthorisedDataAccess,Unauthorised Data Access,Something that acts as or causes Unauthorised Data Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedDataDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedDataDisclosure,Unauthorised Data Disclosure,Something that acts as or causes Unauthorised Data Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedDataModification,class,https://w3id.org/dpv/risk#UnauthorisedDataModification,Unauthorised Data Modification,Something that acts as or causes Unauthorised Data Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedInformationDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure,Unauthorised Information Disclosure,Something that acts as or causes Unauthorised Information Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedReidentification,class,https://w3id.org/dpv/risk#UnauthorisedReidentification,Unauthorised Re-Identification,Something that acts as or causes Unauthorised Re-Identification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedResourceUse,class,https://w3id.org/dpv/risk#UnauthorisedResourceUse,Unauthorised Resource Use,Something that acts as or causes Unauthorised Resource Use,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedSystemAccess,class,https://w3id.org/dpv/risk#UnauthorisedSystemAccess,Unauthorised System Access,Something that acts as or causes Unauthorised System Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedSystemModification,class,https://w3id.org/dpv/risk#UnauthorisedSystemModification,Unauthorised System Modification,Something that acts as or causes Unauthorised System Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnwantedCodeDeletion,class,https://w3id.org/dpv/risk#UnwantedCodeDeletion,Unwanted Code Deletion,Something that acts as or causes Unwanted Code Deletion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnwantedDataDeletion,class,https://w3id.org/dpv/risk#UnwantedDataDeletion,Unwanted Data Deletion,Something that acts as or causes Unwanted Data Deletion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnwantedDisclosureData,class,https://w3id.org/dpv/risk#UnwantedDisclosureData,Unwanted Disclosure of Data,Something that acts as or causes Unwanted Disclosure of Data,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk UserRisks,class,https://w3id.org/dpv/risk#UserRisks,User Risks,Concepts associated with risks that arise due to User or Human use,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk VeryHighLikelihood,class,https://w3id.org/dpv/risk#VeryHighLikelihood,Very High Likelihood,Level where Likelihood is Very High,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -VeryHighRisk,class,https://w3id.org/dpv/risk#VeryHighRisk,Very High Risk,Level where Risk is Very High,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#7RiskLevels;https://w3id.org/dpv/risk#5RiskLevels,The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +VeryHighRisk,class,https://w3id.org/dpv/risk#VeryHighRisk,Very High Risk,Level where Risk is Very High,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#5RiskLevels;https://w3id.org/dpv/risk#7RiskLevels,The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk VeryHighSeverity,class,https://w3id.org/dpv/risk#VeryHighSeverity,Very High Severity,Level where Severity is Very High,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk VeryLowLikelihood,class,https://w3id.org/dpv/risk#VeryLowLikelihood,Very Low Likelihood,Level where Likelihood is Very Low,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -VeryLowRisk,class,https://w3id.org/dpv/risk#VeryLowRisk,Very Low Risk,Level where Risk is Very Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#7RiskLevels;https://w3id.org/dpv/risk#5RiskLevels,The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +VeryLowRisk,class,https://w3id.org/dpv/risk#VeryLowRisk,Very Low Risk,Level where Risk is Very Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#5RiskLevels;https://w3id.org/dpv/risk#7RiskLevels,The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk VeryLowSeverity,class,https://w3id.org/dpv/risk#VeryLowSeverity,Very Low Severity,Level where Severity is Very Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk ViolatingCodeOfConduct,class,https://w3id.org/dpv/risk#ViolatingCodeOfConduct,Violating Code of Conduct,Something that acts as or causes Violation of Code of Conduct,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""ViolationCodeConduct"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ViolatingContractualObligation,class,https://w3id.org/dpv/risk#ViolatingContractualObligation,Violation of Contractual Obligation,Something that acts as or causes Violation of Contractual Obligations,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""ViolationContractualObligations"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk @@ -292,7 +291,6 @@ ViolatingPolicy,class,https://w3id.org/dpv/risk#ViolatingPolicy,Violating Policy ViolatingStatutoryObligations,class,https://w3id.org/dpv/risk#ViolatingStatutoryObligations,Violation of Statutory Obligations,Something that acts as or causes Violation of Statutory Obligations,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""ViolationStatutoryObligations"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ViolenceAgainstChildren,class,https://w3id.org/dpv/risk#ViolenceAgainstChildren,Violence against children,Something that acts as or causes Child Violence,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,"This concept was called ""ChildViolence"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk Vulnerability,class,https://w3id.org/dpv/risk#Vulnerability,Vulnerability,Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk,,,,,2024-02-14,,risk,https://w3id.org/dpv/risk -VulnerabilityCreated,class,https://w3id.org/dpv/risk#VulnerabilityCreated,Vulnerability Created,Something that acts as or causes Vulnerability Created,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#InternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk causedByThreat,property,https://w3id.org/dpv/risk#causedByThreat,caused by threat,Indicates the cause of associated context (subject) was the indicated threat (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk causedByVulnerability,property,https://w3id.org/dpv/risk#causedByVulnerability,caused by vulnerability,Indicates the associated context (subject) is caused by the indicated vulnerability (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk exploitsVulnerability,property,https://w3id.org/dpv/risk#exploitsVulnerability,exploits vulnerability,Indicates the threat (subject) exploits the indicated vulnerability (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk diff --git a/2.1-dev/risk/risk.html b/2.1-dev/risk/risk.html index c8b42bf5f..4efbea699 100644 --- a/2.1-dev/risk/risk.html +++ b/2.1-dev/risk/risk.html @@ -1271,92 +1271,77 @@

Consequences and Impacts

dpv:hasImpact risk:RightsImpact . -

The risk concepts taxonomy is broadly divided into the following categories:

+

The concepts taxonomy is broadly divided into the following categories:

-
-

InternalSecurityThreat

-
    +
    +

    CIA Model

    +

    Confidentiality

    +
    • - risk:VulnerabilityCreated: Something that acts as or causes Vulnerability Created - go to full definition + risk:AuthorisationFailure: Something that acts as or causes Authorisation Failure + go to full definition
    • -
    -
    -
    -

    UserRisks

    -
    -
    -
    -

    ExternalSecurityThreat

    -
    • - risk:Blackmail: Something that acts as or causes Blackmail - go to full definition + risk:ConfidentialityBreach: Something that acts as or causes Confidentiality Breach + go to full definition
    • - risk:BruteForceAuthorisations: Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques - go to full definition - -
    • + risk:DataBreach: Something that acts as or causes Data Breach + go to full definition +
    • risk:Extorsion: Something that acts as or causes Extorsion @@ -1367,6 +1352,16 @@

      ExternalSecurityThreat

      risk:Fraud: Something that acts as or causes Fraud go to full definition +
    • +
    • + risk:IdentityFraud: Something that acts as or causes Identity Fraud + go to full definition + +
    • +
    • + risk:IdentityTheft: Something that acts as or causes Identity Theft + go to full definition +
    • risk:InterceptCommunications: Something that acts as or causes Interception of Communications @@ -1389,8 +1384,8 @@

      ExternalSecurityThreat

    • - risk:Sabotage: Something that acts as or causes Sabotage - go to full definition + risk:Reidentification: Something that acts as or causes Re-identification + go to full definition
    • @@ -1402,6 +1397,33 @@

      ExternalSecurityThreat

      risk:SecurityAttack: Something that acts as or causes an attack on security with the aim of undermining it go to full definition +
    • +
    • + risk:SecurityBreach: Something that acts as or causes Security Breach + go to full definition +
    • risk:Spoofing: Something that acts as or causes Spoofing @@ -1432,11 +1454,6 @@

      ExternalSecurityThreat

      risk:UnauthorisedCodeDisclosure: Something that acts as or causes Unauthorised Code Disclosure go to full definition -
    • -
    • - risk:UnauthorisedCodeModification: Something that acts as or causes Unauthorised Code Modification - go to full definition -
    • risk:UnauthorisedDataAccess: Something that acts as or causes Unauthorised Data Access @@ -1447,11 +1464,6 @@

      ExternalSecurityThreat

      risk:UnauthorisedDataDisclosure: Something that acts as or causes Unauthorised Data Disclosure go to full definition -
    • -
    • - risk:UnauthorisedDataModification: Something that acts as or causes Unauthorised Data Modification - go to full definition -
    • risk:UnauthorisedInformationDisclosure: Something that acts as or causes Unauthorised Information Disclosure @@ -1464,8 +1476,145 @@

      ExternalSecurityThreat

    • - risk:UnauthorisedResourceUse: Something that acts as or causes Unauthorised Resource Use - go to full definition + risk:UnauthorisedSystemAccess: Something that acts as or causes Unauthorised System Access + go to full definition + +
    • +
    • + risk:UnwantedDisclosureData: Something that acts as or causes Unwanted Disclosure of Data + go to full definition + +
    • +
    + +

    Integrity

    +
    -
    -
    -

    OperationalSecurityRisk

    -
      + +

      Availability

      +
      • - risk:AuthorisationFailure: Something that acts as or causes Authorisation Failure - go to full definition + risk:AvailabilityBreach: None + go to full definition
      • @@ -1519,13 +1662,39 @@

        OperationalSecurityRisk

      • - risk:CompromiseAccountCredentials: Something that acts as or causes Account Credentials to be compromised - go to full definition + risk:Cryptojacking: Something that acts as or causes Cryptojacking + go to full definition
      • - risk:DataCorruption: Something that acts as or causes Corruption of Data - go to full definition + risk:DataBreach: Something that acts as or causes Data Breach + go to full definition + +
      • +
      • + risk:DenialServiceAttack: Something that acts as or causes Denial of Service Attack (DoS) + go to full definition + +
      • +
      • + risk:DistributedDenialServiceAttack: Something that acts as or causes Distributed Denial of Service Attack (DDoS) + go to full definition
      • @@ -1539,18 +1708,23 @@

        OperationalSecurityRisk

      • - risk:IdentityFraud: Something that acts as or causes Identity Fraud - go to full definition + risk:MaliciousCodeAttack: Something that acts as or causes Malicious Code Attack + go to full definition
      • - risk:IdentityTheft: Something that acts as or causes Identity Theft - go to full definition + risk:MalwareAttack: Something that acts as or causes Malware Attack + go to full definition
      • - risk:Reidentification: Something that acts as or causes Re-identification - go to full definition + risk:Sabotage: Something that acts as or causes Sabotage + go to full definition + +
      • +
      • + risk:SecurityAttack: Something that acts as or causes an attack on security with the aim of undermining it + go to full definition
      • @@ -1581,13 +1755,13 @@

        OperationalSecurityRisk

    • - risk:Spoofing: Something that acts as or causes Spoofing - go to full definition + risk:SystemFailure: Something that acts as or causes System Failure + go to full definition
    • - risk:SystemFailure: Something that acts as or causes System Failure - go to full definition + risk:SystemIntrusion: Something that acts as or causes System Intrusion + go to full definition
    • @@ -1595,11 +1769,68 @@

      OperationalSecurityRisk

      go to full definition
    • +
    • + risk:UnauthorisedAccesstoPremises: Something that acts as or causes Unauthorised Access to Premises + go to full definition + +
    • +
    • + risk:UnauthorisedActivity: Something that acts as or causes Unauthorised Activity + go to full definition + +
    • +
    • + risk:UnauthorisedResourceUse: Something that acts as or causes Unauthorised Resource Use + go to full definition + +
    • +
    • + risk:UnwantedCodeDeletion: Something that acts as or causes Unwanted Code Deletion + go to full definition + +
    • +
    • + risk:UnwantedDataDeletion: Something that acts as or causes Unwanted Data Deletion + go to full definition + +
    -
    -
    -

    LegalRisk

    -
      +
    + +
    +

    User

    +
    +
    + +
    +

    Legal

    +
    • risk:CopyrightViolation: Something that acts as or causes Copyright Violation go to full definition @@ -1666,10 +1897,11 @@

      LegalRisk

    -
    -
    -

    ReputationalRisk

    -
      +
    + +
    +

    Reputational

    +
    • risk:LoseCredibility: Something that acts as or causes Loss of Credibility go to full definition @@ -1706,10 +1938,11 @@

      ReputationalRisk

    -
    -
    -

    SocietalRisk

    -
      +
    + +
    +

    Societal

    +
    • risk:Discrimination: Something that acts as or causes Discrimination go to full definition @@ -1761,10 +1994,11 @@

      SocietalRisk

    -
    -
    -

    IndividualRisk

    -
      +
    + +
    +

    Individual

    +
    • risk:Harm: Something that acts as or causes Harm to humans go to full definition @@ -1811,14 +2045,16 @@

      IndividualRisk

    -
    -
    -

    EnvironmentalRisk

    -
    -
    -
    -

    FinancialImpact

    -
      +
    + +
    +

    Environmental

    +
    +
    + +
    +

    Financial

    +
    • risk:Benefit: Something that acts as or causes benefits go to full definition @@ -1865,7 +2101,7 @@

      FinancialImpact

    -
    +
@@ -2128,8 +2364,6 @@

Classes

- - @@ -3007,6 +3241,12 @@

Authorisation Failure

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types + risk:IntegrityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -3088,6 +3328,33 @@

None

Broader/Parent types + risk:DataBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:IntegrityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:IntegrityConcept + + Broader/Parent types risk:DataBreachrisk:SecurityBreachrisk:OperationalSecurityRisk @@ -3392,6 +3659,9 @@

Blackmail

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -3473,8 +3743,14 @@

Brute Force Authorisations

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -3724,6 +4000,9 @@

Coercion

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -3883,6 +4162,9 @@

Component Failure

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -3955,6 +4237,9 @@

Component Malfunction

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -4027,6 +4312,15 @@

Compromise Account

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types + risk:IntegrityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -4108,6 +4402,9 @@

Compromise Account Credentials

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -4189,6 +4486,33 @@

Confidentiality Breach

Broader/Parent types + risk:DataBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:IntegrityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:IntegrityConcept + + Broader/Parent types risk:DataBreachrisk:SecurityBreachrisk:OperationalSecurityRisk @@ -4666,6 +4990,9 @@

Cryptojacking

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -4825,6 +5152,18 @@

Data Breach

Broader/Parent types + risk:SecurityBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:SecurityBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:SecurityBreach + → risk:IntegrityConcept + + Broader/Parent types risk:SecurityBreachrisk:OperationalSecurityRiskdpv:RiskConcept @@ -4910,6 +5249,9 @@

Data Corruption

Broader/Parent types + risk:IntegrityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -5069,6 +5411,9 @@

Denial of Service Attack (DoS)

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -5092,7 +5437,7 @@

Denial of Service Attack (DoS)

Source - ISO/IEC 27005:2018, ISO/IEC 27005:2018 + ISO/IEC 27005:2018 @@ -5385,6 +5730,9 @@

Distributed Denial of Service Attack (DDoS)

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -5609,6 +5957,9 @@

Equipment Failure

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -5693,6 +6044,9 @@

Equipment Malfunction

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -6012,6 +6366,9 @@

Extorsion

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -6815,6 +7172,9 @@

Fraud

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -7499,6 +7859,9 @@

Identity Fraud

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -7580,6 +7943,9 @@

Identity Theft

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -7862,7 +8228,7 @@

Incident

Date Created - 2024-02-14 + 2024-05-19 Date Modified @@ -9873,6 +10239,33 @@

None

Broader/Parent types + risk:DataBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:IntegrityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:AvailabilityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:ConfidentialityConcept + + Broader/Parent types + risk:DataBreach + → risk:SecurityBreach + → risk:IntegrityConcept + + Broader/Parent types risk:DataBreachrisk:SecurityBreachrisk:OperationalSecurityRisk @@ -10085,6 +10478,9 @@

Intercept Communications

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -10141,74 +10537,6 @@

Intercept Communications

-
-

Internal Security Threat

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
TermInternalSecurityThreatPrefixrisk
LabelInternal Security Threat
IRIhttps://w3id.org/dpv/risk#InternalSecurityThreat
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types dpv:RiskConcept -
DefinitionConcepts associated with security threats and issues that originate within the organisation
See More: section RISK-CONSEQUENCES in RISK -
-
- - - @@ -11284,8 +11612,17 @@

Malicious Code Attack

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -11365,8 +11702,17 @@

Malware Attack

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -12766,6 +13112,9 @@

Phishing Scam

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -13544,6 +13893,9 @@

Re-identification

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -21592,8 +21944,14 @@

Sabotage

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -21673,6 +22031,9 @@

Scam

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -21754,8 +22115,17 @@

Security Attack

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -21823,6 +22193,15 @@

Security Breach

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types + risk:IntegrityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -22365,10 +22744,16 @@

Spoofing

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept Broader/Parent types + risk:IntegrityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -22450,6 +22835,9 @@

System Failure

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -22534,8 +22922,17 @@

System Intrusion

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -22615,6 +23012,9 @@

System Malfunction

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept @@ -22933,8 +23333,17 @@

Unauthorised Access to Premises

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23014,8 +23423,17 @@

Unauthorised Activity

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23083,8 +23501,14 @@

Unauthorised Code Access

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23164,6 +23588,9 @@

Unauthorised Code Disclosure

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23247,6 +23674,9 @@

Unauthorised Code Modification

Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23326,6 +23756,9 @@

Unauthorised Data Access

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23407,6 +23840,9 @@

Unauthorised Data Disclosure

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23490,6 +23926,9 @@

Unauthorised Data Modification

Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23569,6 +24008,9 @@

Unauthorised Information Disclosure

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23650,6 +24092,9 @@

Unauthorised Re-Identification

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23728,6 +24173,9 @@

Unauthorised Resource Use

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -23809,8 +24257,14 @@

Unauthorised System Access

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23892,6 +24346,9 @@

Unauthorised System Modification

Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -23971,8 +24428,14 @@

Unwanted Code Deletion

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -24052,8 +24515,14 @@

Unwanted Data Deletion

Broader/Parent types + risk:AvailabilityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept + + Broader/Parent types + risk:IntegrityConcept @@ -24133,6 +24602,9 @@

Unwanted Disclosure of Data

Broader/Parent types + risk:ConfidentialityConcept + + Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept @@ -25417,87 +25889,6 @@

Vulnerability

- - - -
-

Vulnerability Created

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
TermVulnerabilityCreatedPrefixrisk
LabelVulnerability Created
IRIhttps://w3id.org/dpv/risk#VulnerabilityCreated
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:InternalSecurityThreat - → dpv:RiskConcept -
DefinitionSomething that acts as or causes Vulnerability Created
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK -
-
@@ -25630,8 +26021,6 @@

Properties

- - @@ -26435,9 +26824,6 @@

has vulnerability

- - - @@ -27237,9 +27623,6 @@

refers to risk

- - - @@ -27334,8 +27717,6 @@

External

- - @@ -27637,9 +28018,6 @@

External

- - - @@ -28223,9 +28601,6 @@

External

- - -
diff --git a/2.1-dev/risk/risk.jsonld b/2.1-dev/risk/risk.jsonld index 311a67a9c..fae734642 100644 --- a/2.1-dev/risk/risk.jsonld +++ b/2.1-dev/risk/risk.jsonld @@ -1,6 +1,6 @@ [ { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L5", + "@id": "https://w3id.org/dpv/risk#RM7x7S4L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -19,7 +19,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.10,xsd:decimal" + "@value": "0.41,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -41,7 +41,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -52,7 +52,57 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:1 L:5)" + "@value": "High Risk (RM7x7 S:4 L:5)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ComponentFailure", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Component Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Component Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of" } ] }, @@ -82,7 +132,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nef681cfae64c43969ff8ef7fdde7753a" + "@id": "_:N9b03e23aa8864f4288a1885778e3b1e4" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -97,6 +147,12 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -120,7 +176,7 @@ ] }, { - "@id": "_:Nef681cfae64c43969ff8ef7fdde7753a", + "@id": "_:N9b03e23aa8864f4288a1885778e3b1e4", "@type": [ "https://schema.org/WebPage" ], @@ -136,11 +192,17 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#LowSeverity", + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S4L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -150,12 +212,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.25,xsd:decimal" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -171,36 +233,24 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3SeverityLevels" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" + "@value": "Low Risk (RM7x7 S:4 L:2)" } ] }, @@ -257,25 +307,32 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#hasRiskSource", + "@id": "https://w3id.org/dpv/risk#IdentityFraud", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv#Risk" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk#RiskSource" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/modified": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nc74530c53d534886a66e5a7f741398bb" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -289,40 +346,54 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the risk (subject) has the indicated risk source (object)" + "@value": "Something that acts as or causes Identity Fraud" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has risk source" + "@value": "Identity Fraud" } + ] + }, + { + "@id": "_:Nc74530c53d534886a66e5a7f741398bb", + "@type": [ + "https://schema.org/WebPage" ], - "https://schema.org/domainIncludes": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv#Risk" + "@value": "ENISA Threat Taxonomy 2016" } ], - "https://schema.org/rangeIncludes": [ + "https://schema.org/url": [ { - "@id": "https://w3id.org/dpv/risk#RiskSource" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk#3SeverityLevels", + "@id": "https://w3id.org/dpv/risk#LoseNegotiatingCapacity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -332,7 +403,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nf8d97cf300cf44d5881be9535d0b1dff" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -348,54 +430,63 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Severity" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 3 Severity Levels from High to Low" + "@value": "Something that acts as or causes Loss of Negotiating Capacity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "3 Severity Levels" + "@value": "Lose of Negotiating Capacity" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure", + "@id": "_:Nf8d97cf300cf44d5881be9535d0b1dff", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#hasRiskSource", + "@type": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@id": "https://w3id.org/dpv#Risk" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#RiskSource" + } + ], + "http://purl.org/dc/terms/created": [ { - "@id": "_:N540e39aa17014568ba5a2b03534c1f19" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -409,51 +500,40 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Disclosure" + "@value": "Indicates the risk (subject) has the indicated risk source (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Disclosure" + "@value": "has risk source" } - ] - }, - { - "@id": "_:N540e39aa17014568ba5a2b03534c1f19", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "https://schema.org/domainIncludes": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@id": "https://w3id.org/dpv#Risk" } ], - "https://schema.org/url": [ + "https://schema.org/rangeIncludes": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@id": "https://w3id.org/dpv/risk#RiskSource" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L5", + "@id": "https://w3id.org/dpv/risk#ExtremelyLowSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -463,12 +543,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.20,xsd:decimal" + "@value": "0.01,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -484,47 +564,60 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" + "@value": "Level where Severity is Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:2 L:5)" + "@value": "Extremely Low Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentDetectionReport", + "@id": "https://w3id.org/dpv/risk#Discrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog" + } + ], + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-19" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk#" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -535,33 +628,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the detection of a Incident" + "@value": "Something that acts as or causes Discrimination" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Detection Report" + "@value": "Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingStatutoryObligations", + "@id": "https://w3id.org/dpv/risk#RM7x7S6L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -574,15 +667,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nb5000792f7ae42ffb4c7efe3b93be7df" + "@value": "0.61,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -593,87 +680,86 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Statutory Obligations" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Statutory Obligations" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0" + "@value": "Very High Risk (RM7x7 S:6 L:5)" } ] }, { - "@id": "_:Nb5000792f7ae42ffb4c7efe3b93be7df", + "@id": "https://w3id.org/dpv/risk#ConsequenceControl", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } - ] - }, - { - "@id": "https://w3id.org/dpv/examples", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.w3.org/TR/html/" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@value": "Examples for Data Privacy Vocabulary" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/examples" + "@language": "en", + "@value": "Risk Mitigation Measure that controls the Consequences" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Consequence Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingEthicsCode", + "@id": "https://w3id.org/dpv/risk#RightsImpact", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -698,7 +784,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd8ddc1f8024a4418b62c344837cff0cd" + "@id": "_:N7b552ef83c274f84b167cc68c23676bb" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -709,18 +795,21 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" + }, + { + "@id": "https://w3id.org/dpv#Impact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Ethics Code" + "@value": "Something that acts as or causes Impact to Rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -731,18 +820,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Ethics Code" + "@value": "Impact to Rights" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0" + "@value": "This concept was called \"ImpactToRights\" in DPV 2.0" } ] }, { - "@id": "_:Nd8ddc1f8024a4418b62c344837cff0cd", + "@id": "_:N7b552ef83c274f84b167cc68c23676bb", "@type": [ "https://schema.org/WebPage" ], @@ -758,7 +847,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#MonitorRiskControl", + "@id": "https://w3id.org/dpv/risk#ImpactControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -788,13 +877,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MonitorControl" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors another Control" + "@value": "Risk Mitigation Measure that controls Impacts" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -805,27 +894,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Control" + "@value": "Impact Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#5SeverityLevels", + "@id": "https://w3id.org/dpv/risk#ViolatingPolicy", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -840,33 +918,32 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Severity" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 5 Severity Levels from Very High to Very Low" + "@value": "Something that acts as or causes violation of policy which can be either internal or external policy" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "5 Severity Levels" + "@value": "Violating Policy" } ] }, { - "@id": "https://w3id.org/dpv/risk#RecoveryControl", + "@id": "https://w3id.org/dpv/risk#IncidentNotice", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { @@ -879,6 +956,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#Notice" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -887,33 +969,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv#Notice" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to recover from event" + "@value": "Notice associated with an Incident" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Recovery Control" + "@value": "Incident Notice" } ] }, { - "@id": "https://w3id.org/dpv/risk#PersonalSafetyEndangerment", + "@id": "https://w3id.org/dpv/risk#RM3x3S1L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -926,15 +1008,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Na66b6d002d3f448981a58870da1a686e" + "@value": "0.11,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -950,45 +1026,86 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Personal Safety Endangerment" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Personal Safety Endangerment" + "@value": "Low Risk (RM3x3 S:1 L:1)" } ] }, { - "@id": "_:Na66b6d002d3f448981a58870da1a686e", + "@id": "https://w3id.org/dpv/risk#RM3x3S2L2", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.44,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Moderate Risk (RM3x3 S:2 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Injury", + "@id": "https://w3id.org/dpv/risk#Extorsion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1013,7 +1130,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N1ef56bb9fadb431ba4c270603c7acdec" + "@id": "_:N78e6085a5a4a4a08adbcdb4af46722d9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1029,13 +1146,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Injury" + "@value": "Something that acts as or causes Extorsion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1046,28 +1166,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Injury" + "@value": "Extorsion" } ] }, { - "@id": "_:N1ef56bb9fadb431ba4c270603c7acdec", + "@id": "_:N78e6085a5a4a4a08adbcdb4af46722d9", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S5L2", + "@id": "https://w3id.org/dpv/risk#RM3x3S3L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1086,7 +1206,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.40,xsd:decimal" + "@value": "0.67,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1102,13 +1222,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1119,91 +1239,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:5 L:2)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#HumanErrors", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N7d9296887d1d4b6ea986d2ad6579a1ec" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#UserRisks" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Human Errors" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Human Errors" - } - ] - }, - { - "@id": "_:N7d9296887d1d4b6ea986d2ad6579a1ec", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "High Risk (RM3x3 S:3 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L5", + "@id": "https://w3id.org/dpv/risk#RM3x3S1L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1222,7 +1263,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.41,xsd:decimal" + "@value": "0.22,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1238,13 +1279,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1255,12 +1296,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:4 L:5)" + "@value": "Low Risk (RM3x3 S:1 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedResourceUse", + "@id": "https://w3id.org/dpv/risk#ConfidentialityBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1285,7 +1326,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd4175f97fd33423f9014c3d690d56fad" + "@id": "_:N0571680fc6554da2a384a2e851d510c0" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1301,13 +1342,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#DataBreach" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Resource Use" + "@value": "Something that acts as or causes Confidentiality Breach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1318,12 +1362,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Resource Use" + "@value": "Confidentiality Breach" } ] }, { - "@id": "_:Nd4175f97fd33423f9014c3d690d56fad", + "@id": "_:N0571680fc6554da2a384a2e851d510c0", "@type": [ "https://schema.org/WebPage" ], @@ -1339,31 +1383,25 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S2L1", + "@id": "https://w3id.org/dpv/risk#Threat", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-02-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.22,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#RiskSource" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1374,33 +1412,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#RiskSource" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low" + "@value": "Risk source event which causes Risk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM3x3 S:2 L:1)" + "@value": "Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L4", + "@id": "https://w3id.org/dpv/risk#ExtremelyLowLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -1410,12 +1448,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.49,xsd:decimal" + "@value": "0.01,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1431,88 +1469,105 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High" + "@value": "Level where Likelihood is Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:6 L:4)" + "@value": "Extremely Low Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#JudicialPenalty", + "@id": "https://w3id.org/dpv/risk#IncidentIdentifier", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@language": "en", - "@value": "accepted" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@language": "en", + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that involves or causes judicial penalties to be paid" + "@value": "Identifier associated with an incident" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Judicial Penalty" + "@value": "Incident Identifier" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentHandlingReport", + "@id": "https://w3id.org/dpv/risk#RM7x7S4L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "0.49,xsd:decimal" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1523,42 +1578,38 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Handling Report" + "@value": "Very High Risk (RM7x7 S:4 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#isVulnerabilityOf", + "@id": "https://w3id.org/dpv/risk#ReductionControl", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" - ], - "http://purl.org/dc/dcam/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Vulnerability" - } + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1572,35 +1623,35 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskControl" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the vulnerability (subject) is associated with indicated context (object)" + "@value": "Control that reduces the likelihood or severity of an event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "is vulnerability of" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@value": "Reduction Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#ModerateRisk", + "@id": "https://w3id.org/dpv/risk#ExposureToHarmfulSpeech", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -1610,12 +1661,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.5,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N95f46ba999c74717949420ed05a75570" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1631,67 +1688,55 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3RiskLevels" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Moderate" + "@value": "Something that acts as or causes Harmful Speech" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk" + "@value": "Exposure to Harmful Speech" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" + "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk#incident-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L3", + "@id": "_:N95f46ba999c74717949420ed05a75570", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/name": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "https://schema.org/url": [ { - "@value": "0.37,xsd:decimal" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityBreach", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -1706,59 +1751,38 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, { - "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" + "@id": "https://w3id.org/dpv/risk#DataBreach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "High Risk (RM7x7 S:6 L:3)" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExposureToHarmfulSpeech", + "@id": "https://w3id.org/dpv/risk#ThreatSource", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-02-14" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "_:Ne595b225e5ee4cc2b2374256ef05fa2e" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1767,77 +1791,44 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Harmful Speech" + "@value": "Source of threat event, including both agent and non-agent sources" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Exposure to Harmful Speech" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0" - } - ] - }, - { - "@id": "_:Ne595b225e5ee4cc2b2374256ef05fa2e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Threat Source" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L7", + "@id": "https://w3id.org/dpv/risk#IncidentDetectionReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.29,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1848,64 +1839,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate" + "@value": "A report describing the detection of a Incident" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:2 L:7)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-jsonld", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/json-ld11/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/application/ld+json" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - JSON-LD serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk.jsonld" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@value": "Incident Detection Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#MonitorConsequence", + "@id": "https://w3id.org/dpv/risk#RM7x7S5L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -1915,7 +1875,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.41,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1931,29 +1896,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MonitorControl" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Consequence" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Consequence" + "@value": "High Risk (RM7x7 S:5 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#DataCorruption", + "@id": "https://w3id.org/dpv/risk#Sabotage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1978,7 +1943,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ncd7b81f0daef4263a47284ebb48b83f6" + "@id": "_:N2fc72d8ce45943bcaad06c0a96aac629" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1989,18 +1954,24 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Corruption of Data" + "@value": "Something that acts as or causes Sabotage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2011,43 +1982,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Corruption" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"Corruption Data\" in DPV 2.0" + "@value": "Sabotage" } ] }, { - "@id": "_:Ncd7b81f0daef4263a47284ebb48b83f6", + "@id": "_:N2fc72d8ce45943bcaad06c0a96aac629", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#incident-status-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IncidentImpactAssessment", + "@id": "https://w3id.org/dpv/risk#RM5x5S1L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -2057,17 +2017,17 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "0.20,xsd:decimal" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv#ImpactAssessment" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2078,38 +2038,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#ImpactAssessment" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "An impact assessment associated with a incident" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Impact Assessment" + "@value": "Low Risk (RM5x5 S:1 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RemedyControl", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.06,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2125,38 +2095,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to remedy consequences of event" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remedy Control" + "@value": "Extremely Low Risk (RM7x7 S:1 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#DetectionControl", + "@id": "https://w3id.org/dpv/risk#RM5x5S4L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2172,100 +2152,55 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to detect event" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Detection Control" + "@value": "Low Risk (RM5x5 S:4 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#hasThreatSource", + "@id": "https://w3id.org/dpv/risk#AuthorisationFailure", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" - ], - "http://purl.org/dc/dcam/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Threat" - } + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk#ThreatSource" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Indicates the threat (subject) has the indicated source (object)" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#core-properties" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "has threat source" + "@value": "2022-08-17" } ], - "https://schema.org/domainIncludes": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk#Threat" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "https://schema.org/rangeIncludes": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/risk#ThreatSource" + "@id": "_:N588812d3250243469d4d5b0cbd82dc9e" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#SecurityAttack", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -2280,13 +2215,19 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes an attack on security with the aim of undermining it" + "@value": "Something that acts as or causes Authorisation Failure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2297,47 +2238,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Security Attack" + "@value": "Authorisation Failure" } ] }, { - "@id": "https://w3id.org/dpv/primer", + "@id": "_:N588812d3250243469d4d5b0cbd82dc9e", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Primer for Data Privacy Vocabulary" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/primer" + "@value": "ENISa Trust Services Security Incidents 2021" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "https://schema.org/url": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3", + "@id": "https://w3id.org/dpv/risk#CopyrightViolation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -2350,6 +2276,17 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N3984b17b1694455793b94c3ad850178d" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -2363,42 +2300,64 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types" + "@value": "Something that acts as or causes Copyright Violation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix 3x3" + "@value": "Copyright Violation" } ] }, { - "@id": "https://w3id.org/dpv/risk#causedByVulnerability", + "@id": "_:N3984b17b1694455793b94c3ad850178d", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" + "https://schema.org/WebPage" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM3x3S2L3", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.67,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2412,35 +2371,35 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the associated context (subject) is caused by the indicated vulnerability (object)" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "caused by vulnerability" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@value": "High Risk (RM3x3 S:2 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S1L3", + "@id": "https://w3id.org/dpv/risk#SourceControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -2450,12 +2409,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.33,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2471,29 +2425,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" + "@value": "Risk Mitigation Measure that controls the Source" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM3x3 S:1 L:3)" + "@value": "Source Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#SystemIntrusion", + "@id": "https://w3id.org/dpv/risk#EquipmentMalfunction", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2518,7 +2472,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N7a5848cbabb14c8ea2d162432eba32f0" + "@id": "_:N53bfad5db8324151841ce01472d06f41" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2534,13 +2488,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Intrusion" + "@value": "Something that acts as or causes Equipment Malfunction" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2551,32 +2508,54 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Intrusion" + "@value": "Equipment Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here equipment refers to physical equipment" } ] }, { - "@id": "_:N7a5848cbabb14c8ea2d162432eba32f0", + "@id": "_:N53bfad5db8324151841ce01472d06f41", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#EnvironmentalRisk", + "@id": "https://w3id.org/dpv/risk#RM5x5S3L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.36,xsd:decimal" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -2591,60 +2570,42 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that have their origin in environment or can affect the environment at large" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Environmental Risk" + "@value": "Moderate Risk (RM5x5 S:3 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#MalwareAttack", + "@id": "https://w3id.org/dpv/risk#hasIncident", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N933b42794d4f41a39ee17bc9b20bf774" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2658,47 +2619,31 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Malware Attack" + "@value": "Indicates an incident is associated with the specified context" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Malware Attack" - } - ] - }, - { - "@id": "_:N933b42794d4f41a39ee17bc9b20bf774", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "has incident" } ], - "https://schema.org/url": [ + "https://schema.org/rangeIncludes": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@id": "https://w3id.org/dpv/risk#Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S3L4", + "@id": "https://w3id.org/dpv/risk#RM7x7S5L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2717,7 +2662,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.48,xsd:decimal" + "@value": "0.71,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2733,13 +2678,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2750,30 +2695,42 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:3 L:4)" + "@value": "Extremely High Risk (RM7x7 S:5 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#AccidentalIncident", + "@id": "https://w3id.org/dpv/risk#core-properties", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S5L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "0.51,xsd:decimal" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2784,33 +2741,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident caused due to accidental actions arising from human or human-controlled situations" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Accidental Incident" + "@value": "Very High Risk (RM7x7 S:5 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L3", + "@id": "https://w3id.org/dpv/risk#PhishingScam", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -2823,9 +2780,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.12,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nb657a11b610f419a86eb9ea4a94e7e37" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2841,33 +2804,52 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" + "@value": "Something that acts as or causes Phishing Scam" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:2 L:3)" + "@value": "Phishing Scam" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S2L3", + "@id": "_:Nb657a11b610f419a86eb9ea4a94e7e37", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#VeryHighSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -2877,12 +2859,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.24,xsd:decimal" + "@value": "0.9,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2898,49 +2880,47 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5SeverityLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Level where Severity is Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:2 L:3)" + "@value": "Very High Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#Harm", + "@id": "https://w3id.org/dpv/risk#ContainmentControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-13" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2956,54 +2936,47 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Harm to humans" + "@value": "Control to contain event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Harm" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept refers to the general abstract notion of harm" + "@value": "Containment Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S5L4", + "@id": "https://w3id.org/dpv/risk#hasThreatSource", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#Threat" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv/risk#ThreatSource" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/created": [ { - "@value": "0.80,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3017,35 +2990,46 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" + "@value": "Indicates the threat (subject) has the indicated source (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:5 L:4)" + "@value": "has threat source" } - ] + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Threat" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#ThreatSource" + } + ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L2", + "@id": "https://w3id.org/dpv/risk#risk-controls-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#LowRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -3055,12 +3039,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.29,xsd:decimal" + "@value": "0.25,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3076,29 +3060,41 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#7RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3RiskLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate" + "@value": "Level where Risk is Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:7 L:2)" + "@value": "Low Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskAssessment", + "@id": "https://w3id.org/dpv/risk#IncidentConcludingReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" @@ -3106,13 +3102,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO 31073:2022 Risk management vocabulary" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3122,7 +3112,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#RiskManagement" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3133,94 +3123,54 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskManagement" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Assessment of risk involving its identification, analysis, and evaluation" + "@value": "A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Assessment" + "@value": "Incident Concluding Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#hasVulnerability", + "@id": "https://w3id.org/dpv/risk#UnauthorisedDataAccess", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Indicates the associated context (subject) has indicated vulnerability (object)" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#core-properties" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "has vulnerability" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@value": "2022-08-17" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ConsequenceControl", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "Harshvardhan J. Pandit" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/source": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@id": "_:N0eacc049940646a99623da2cd6a2d394" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3236,49 +3186,56 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that controls the Consequences" + "@value": "Something that acts as or causes Unauthorised Data Access" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Consequence Control" + "@value": "Unauthorised Data Access" } ] }, { - "@id": "https://w3id.org/dpv/risk#RightsExercisePrevention", + "@id": "_:N0eacc049940646a99623da2cd6a2d394", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IncidentReport", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3286,6 +3243,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#RecordsOfActivities" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -3294,35 +3256,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv#RecordsOfActivities" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Prevent Exercising of Rights" + "@value": "Documented information about an incident, its handling, assessments,and notifications" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Prevent Exercising of Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0" + "@value": "Incident Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseNegotiatingCapacity", + "@id": "https://w3id.org/dpv/risk#CompromiseAccountCredentials", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3347,7 +3303,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd8a232e440f041b496b97da8007b588a" + "@id": "_:N1005943ded74408ea68c811475686000" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3363,13 +3319,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Negotiating Capacity" + "@value": "Something that acts as or causes Account Credentials to be compromised" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3380,58 +3339,46 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Negotiating Capacity" + "@value": "Compromise Account Credentials" } ] }, { - "@id": "_:Nd8a232e440f041b496b97da8007b588a", + "@id": "_:N1005943ded74408ea68c811475686000", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseOpportunity", + "@id": "https://w3id.org/dpv/risk#IntegrityIncident", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-05-19" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "_:N0e6dade5a2814d0f815e1c5dd41f1c65" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3442,45 +3389,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Opportunity" + "@value": "Incident where the integrity of information or system has been affected" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Opportunity" - } - ] - }, - { - "@id": "_:N0e6dade5a2814d0f815e1c5dd41f1c65", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Integrity Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#ComponentFailure", + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3499,13 +3430,22 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Component Failure" + "@value": "Something that acts as or causes Unauthorised Activity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3516,32 +3456,26 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Component Failure" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of" + "@value": "Unauthorised Activity" } ] }, { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels", + "@id": "https://w3id.org/dpv/risk#RiskSource", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/created": [ { - "@value": "Harshvardhan J. Pandit" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/modified": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3549,6 +3483,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#RiskConcept" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -3557,53 +3496,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Severity" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 7 Severity Levels from Extremely High to Extremely Low" + "@value": "The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "7 Severity Levels" + "@value": "Risk Source" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskSource", + "@id": "https://w3id.org/dpv/risk#RM7x7S6L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/contributor": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "0.37,xsd:decimal" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3614,33 +3553,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Source" + "@value": "High Risk (RM7x7 S:6 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#AccidentalMisuse", + "@id": "https://w3id.org/dpv/risk#ModerateSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#Severity" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.5,xsd:decimal" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -3655,38 +3610,66 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UserRisks" + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3SeverityLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Accidental Misuse" + "@value": "Level where Severity is Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Accidental Misuse" + "@value": "Moderate Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#ContainmentControl", + "@id": "https://w3id.org/dpv/risk#BruteForceAuthorisations", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nb75b090fdcda4ec38e841680681bf642" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3702,29 +3685,51 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to contain event" + "@value": "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Containment Control" + "@value": "Brute Force Authorisations" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S2L4", + "@id": "_:Nb75b090fdcda4ec38e841680681bf642", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S4L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3743,7 +3748,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.32,xsd:decimal" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3759,13 +3764,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3776,16 +3781,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:2 L:4)" + "@value": "Extremely Low Risk (RM7x7 S:4 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L1", + "@id": "https://w3id.org/dpv/risk#IncidentHalted", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#IncidentStatus" ], "http://purl.org/dc/terms/contributor": [ { @@ -3795,12 +3800,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.04,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3816,33 +3816,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#IncidentStatus" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "The incident has halted or paused with a high likelihood of resuming or recurring" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:2 L:1)" + "@value": "Incident Halted" } ] }, { - "@id": "https://w3id.org/dpv/risk#LowRisk", + "@id": "https://w3id.org/dpv/risk#RM7x7S6L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -3852,12 +3852,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.25,xsd:decimal" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3873,41 +3873,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3RiskLevels" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" + "@value": "Moderate Risk (RM7x7 S:6 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Sabotage", + "@id": "https://w3id.org/dpv/risk#Payment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3915,13 +3903,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], "http://purl.org/dc/terms/modified": [ @@ -3930,11 +3918,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nddcd9454cd3f48779b8299743d6f1150" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -3948,13 +3931,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Sabotage" + "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3965,28 +3948,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sabotage" - } - ] - }, - { - "@id": "_:Nddcd9454cd3f48779b8299743d6f1150", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Payment" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L1", + "@id": "https://w3id.org/dpv/risk#RM5x5S5L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4005,7 +3972,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.02,xsd:decimal" + "@value": "0.80,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4021,13 +3988,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4038,16 +4005,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:1 L:1)" + "@value": "Very High Risk (RM5x5 S:5 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentTerminated", + "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -4057,7 +4024,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4073,33 +4040,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" + "@id": "https://w3id.org/dpv#Likelihood" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring" + "@value": "Scale with 5 Likelihood Levels from Very High to Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Terminated" + "@value": "5 Likelihood Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#MaliciousCodeAttack", + "@id": "https://w3id.org/dpv/risk#RM7x7S5L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -4112,15 +4079,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N7beef942706b41468112e467b91c5f39" + "@value": "0.10,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4136,49 +4097,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Malicious Code Attack" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Malicious Code Attack" + "@value": "Very Low Risk (RM7x7 S:5 L:1)" } ] }, { - "@id": "_:N7beef942706b41468112e467b91c5f39", + "@id": "https://w3id.org/dpv/risk#RM7x7S6L4", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.49,xsd:decimal" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ViolatingPolicy", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -4193,33 +4154,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes violation of policy which can be either internal or external policy" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Policy" + "@value": "Very High Risk (RM7x7 S:6 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L4", + "@id": "https://w3id.org/dpv/risk#Scam", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -4232,9 +4193,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.41,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nea270aca30b44f5a8cfda049ee8bf631" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4250,84 +4217,82 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + "@value": "Something that acts as or causes Scam" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:5 L:4)" + "@value": "Scam" } ] }, { - "@id": "https://w3id.org/dpv/risk#PhysicalHarm", + "@id": "_:Nea270aca30b44f5a8cfda049ee8bf631", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "accepted" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "https://schema.org/url": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-html", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://www.w3.org/TR/html/" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/format": [ { - "@language": "en", - "@value": "Physical Harm" + "@id": "https://www.iana.org/assignments/media-types/text/html" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L1", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/title": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Risk Concepts - HTML serialiation" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv/risk/risk.html" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@value": "0.10,xsd:decimal" + "@id": "http://www.w3.org/ns/dx/prof/role/specification" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IndividualRisk", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -4340,35 +4305,30 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low" + "@value": "Risks and issues that affect or have the potential to affect specific individuals" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:5 L:1)" + "@value": "Individual Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -4378,7 +4338,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4394,33 +4359,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Likelihood" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 3 Likelihood Levels from High to Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "3 Likelihood Levels" + "@value": "Low Risk (RM7x7 S:2 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#HighSeverity", + "@id": "https://w3id.org/dpv/risk#RM5x5S4L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -4430,12 +4395,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.75,xsd:decimal" + "@value": "0.80,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4451,41 +4416,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3SeverityLevels" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" + "@value": "Very High Risk (RM5x5 S:4 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L7", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4504,7 +4457,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.43,xsd:decimal" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4526,7 +4479,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4537,16 +4490,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:3 L:7)" + "@value": "Low Risk (RM7x7 S:2 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S5L1", + "@id": "https://w3id.org/dpv/risk#5RiskLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -4556,12 +4509,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.20,xsd:decimal" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4577,29 +4525,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv#RiskLevel" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low" + "@value": "Scale with 5 Risk Levels from Very High to Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:5 L:1)" + "@value": "5 Risk Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#Fee", + "@id": "https://w3id.org/dpv/risk#Harm", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4607,13 +4555,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-13" } ], "http://purl.org/dc/terms/modified": [ @@ -4622,12 +4570,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "DGA 2.10" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -4636,18 +4578,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides fees e.g. for using a service" + "@value": "Something that acts as or causes Harm to humans" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4658,16 +4600,38 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Fee" + "@value": "Harm" } - ] + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept refers to the general abstract notion of harm" + } + ] }, { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat", + "@id": "https://w3id.org/dpv/risk#RM5x5S2L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.08,xsd:decimal" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -4682,29 +4646,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Concepts associated with security threats that are likely to originate externally" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "External Security Threat" + "@value": "Very Low Risk (RM5x5 S:2 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#CopyrightViolation", + "@id": "https://w3id.org/dpv/risk#ViolatingEthicsCode", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4729,7 +4693,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N73922ea12cd34584b91e209f306167ae" + "@id": "_:N5971f1bb7e3149b49a4335be11b0926f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4740,7 +4704,7 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ @@ -4751,7 +4715,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Copyright Violation" + "@value": "Something that acts as or causes Violation of Ethics Code" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4762,58 +4726,52 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Copyright Violation" + "@value": "Violating Ethics Code" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0" } ] }, { - "@id": "_:N73922ea12cd34584b91e209f306167ae", + "@id": "_:N5971f1bb7e3149b49a4335be11b0926f", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#CompromiseAccount", + "@id": "https://w3id.org/dpv/risk#IncidentPreliminaryReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-05-19" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "_:N2ad682e6dc844471903bc2f55f3eaae7" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4824,45 +4782,86 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes a compromised account that is then used by the compromiser" + "@value": "A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account" + "@value": "Incident Preliminary Report" } ] }, { - "@id": "_:N2ad682e6dc844471903bc2f55f3eaae7", + "@id": "https://w3id.org/dpv/risk#RM7x7S3L3", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.18,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Low Risk (RM7x7 S:3 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#VulnerabilityCreated", + "@id": "https://w3id.org/dpv/risk#LoseTrust", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4887,7 +4886,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nc0018c079b6b42619d869b3ae63ec70a" + "@id": "_:N95b0eaaa71714fb48e2d00a428e03220" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4903,13 +4902,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#InternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Vulnerability Created" + "@value": "Something that acts as or causes Loss of Trust" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4920,12 +4919,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Vulnerability Created" + "@value": "Lose of Trust" } ] }, { - "@id": "_:Nc0018c079b6b42619d869b3ae63ec70a", + "@id": "_:N95b0eaaa71714fb48e2d00a428e03220", "@type": [ "https://schema.org/WebPage" ], @@ -4941,58 +4940,44 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#EnvironmentalIncident", + "@id": "https://w3id.org/dpv/risk#incident-classes", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk#Incident" - } + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/examples", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@language": "en", - "@value": "accepted" + "@id": "https://www.w3.org/TR/html/" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "Incident caused due to environmental factors outside human controls" + "@value": "Examples for Data Privacy Vocabulary" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/examples" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "Environmental Incident" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L7", + "@id": "https://w3id.org/dpv/risk#RM5x5S5L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -5011,7 +4996,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.71,xsd:decimal" + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5027,13 +5012,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5044,16 +5029,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:5 L:7)" + "@value": "Low Risk (RM5x5 S:5 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#7RiskLevels", + "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemAccess", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -5063,7 +5048,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6fdf74981d95420a82b9c97acf9aa9eb" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5079,33 +5075,55 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskLevel" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 7 Risk Levels from Extremely High to Extremely Low" + "@value": "Something that acts as or causes Unauthorised System Access" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "7 Risk Levels" + "@value": "Unauthorised System Access" } ] }, { - "@id": "https://w3id.org/dpv/risk#RemoveSource", + "@id": "_:N6fdf74981d95420a82b9c97acf9aa9eb", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Coercion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -5115,12 +5133,23 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk#" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nc78302d156fb497aae9594fa63bb9fa7" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5131,33 +5160,52 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SourceControl" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that removes the risk source" + "@value": "Something that acts as or causes Coercion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remove Source" + "@value": "Coercion" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S1L1", + "@id": "_:Nc78302d156fb497aae9594fa63bb9fa7", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Threat Taxonomy 2016" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#VeryHighLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -5167,12 +5215,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.04,xsd:decimal" + "@value": "0.9,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5188,33 +5236,42 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Level where Likelihood is Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:1 L:1)" + "@value": "Very High Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels", + "@id": "https://w3id.org/dpv/risk#RM5x5S3L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -5224,7 +5281,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.60,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5240,50 +5302,69 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Likelihood" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 5 Likelihood Levels from Very High to Very Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "5 Likelihood Levels" + "@value": "Very High Risk (RM5x5 S:3 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L6", + "@id": "https://w3id.org/dpv/risk#Privacy", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@value": "0.37,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Privacy" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#LegalRisk", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -5297,33 +5378,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" + "@value": "Risks and issues that have their basis in legal requirements and enforcement" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:3 L:6)" + "@value": "Legal Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5", + "@id": "https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -5336,6 +5417,17 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N7487c570f8f54358874e08fa38c8f27d" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -5349,33 +5441,58 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types" + "@value": "Something that acts as or causes Unauthorised Access to Premises" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix 5x5" + "@value": "Unauthorised Access to Premises" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S4L4", + "@id": "_:N7487c570f8f54358874e08fa38c8f27d", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Injury", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -5388,9 +5505,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.64,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Na6c5e17bb8ac4135b62412f66dd88460" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5406,33 +5529,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" + "@value": "Something that acts as or causes Injury" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:4 L:4)" + "@value": "Injury" } ] }, { - "@id": "https://w3id.org/dpv/risk#5RiskLevels", + "@id": "_:Na6c5e17bb8ac4135b62412f66dd88460", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RemoveImpact", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -5442,7 +5581,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5458,53 +5597,47 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskLevel" + "@id": "https://w3id.org/dpv/risk#ImpactControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 5 Risk Levels from Very High to Very Low" + "@value": "Control that removes Impact i.e. prevents it from materialising" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "5 Risk Levels" + "@value": "Remove Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L5", + "@id": "https://w3id.org/dpv/risk#IncidentAssessmentReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.61,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5515,48 +5648,43 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" + "@value": "A report describing the assessment of an incident in terms of its effects or impacts" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:6 L:5)" + "@value": "Incident Assessment Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L4", + "@id": "https://w3id.org/dpv/risk#RiskAssessment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-02-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.16,xsd:decimal" + "@language": "en", + "@value": "ISO 31073:2022 Risk management vocabulary" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5564,6 +5692,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#RiskManagement" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -5572,33 +5705,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskManagement" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low" + "@value": "Assessment of risk involving its identification, analysis, and evaluation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:2 L:4)" + "@value": "Risk Assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskMatrix", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAssessment" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -5608,12 +5741,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N812ddb57c74f4cbeb4d59d4bc7907be8" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5629,75 +5762,93 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskAssessment" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other." + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix" + "@value": "Moderate Risk (RM7x7 S:2 L:6)" } ] }, { - "@id": "_:N812ddb57c74f4cbeb4d59d4bc7907be8", + "@id": "https://w3id.org/dpv/risk#ReputationalRisk", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "IEC 31010:2019" + "@id": "https://w3id.org/dpv/risk#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "https://www.iso.org/standard/72140.html" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv#RiskConcept" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Risks and issues that affect the reputation of the organisation" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Reputational Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedDataDisclosure", + "@id": "https://w3id.org/dpv/risk#RiskControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/vocab/vann/example": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@id": "https://w3id.org/dpv/examples#E0071" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "_:Nf415d60c8c8849ba95e5611d481b06ce" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv#RiskMitigationMeasure" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5708,45 +5859,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv#RiskMitigationMeasure" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Disclosure" + "@value": "Control that modifies risk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Disclosure" - } - ] - }, - { - "@id": "_:Nf415d60c8c8849ba95e5611d481b06ce", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Risk Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#Coercion", + "@id": "https://w3id.org/dpv/risk#InterceptCommunications", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -5771,7 +5906,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N61513676426149faae9e58063eb667d8" + "@id": "_:N1f36b972c50f49fb9b474152b57cf474" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5782,10 +5917,13 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -5793,7 +5931,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Coercion" + "@value": "Something that acts as or causes Interception of Communications" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5804,48 +5942,38 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Coercion" + "@value": "Intercept Communications" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0" } ] }, { - "@id": "_:N61513676426149faae9e58063eb667d8", + "@id": "_:N1f36b972c50f49fb9b474152b57cf474", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L5", + "@id": "https://w3id.org/dpv/risk#JudicialPenalty", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.71,xsd:decimal" - } + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -5860,33 +5988,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High" + "@value": "Something that involves or causes judicial penalties to be paid" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:7 L:5)" + "@value": "Judicial Penalty" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolenceAgainstChildren", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -5899,15 +6027,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nb34535276ddd4a56ac18dcc8fc489cbb" + "@value": "0.43,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5923,71 +6045,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Child Violence" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violence against children" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ChildViolence\" in DPV 2.0" - } - ] - }, - { - "@id": "_:Nb34535276ddd4a56ac18dcc8fc489cbb", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "High Risk (RM7x7 S:7 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RightsViolation", + "@id": "https://w3id.org/dpv/risk#RM3x3S3L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6003,55 +6102,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Rights" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0" + "@value": "High Risk (RM3x3 S:3 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#ModerateLikelihood", + "@id": "https://w3id.org/dpv/risk#EnvironmentalRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.5,xsd:decimal" - } + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -6066,45 +6143,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Moderate" + "@value": "Risks and issues that have their origin in environment or can affect the environment at large" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" + "@value": "Environmental Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemAccess", + "@id": "https://w3id.org/dpv/risk#RM7x7S4L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -6117,15 +6182,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N4387faf4bb854435bfdc47ebf666782a" + "@value": "0.33,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6141,49 +6200,89 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised System Access" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised System Access" + "@value": "High Risk (RM7x7 S:4 L:4)" } ] }, { - "@id": "_:N4387faf4bb854435bfdc47ebf666782a", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L4", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.57,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Very High Risk (RM7x7 S:7 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#MonitorRisk", + "@id": "https://w3id.org/dpv/risk#IncidentImpactAssessment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/contributor": [ { @@ -6201,6 +6300,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#ImpactAssessment" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -6209,29 +6313,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MonitorControl" + "@id": "https://w3id.org/dpv#ImpactAssessment" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk" + "@value": "An impact assessment associated with a incident" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Risk" + "@value": "Incident Impact Assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#Spoofing", + "@id": "https://w3id.org/dpv/risk#ErroneousSystemUse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -6256,10 +6360,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N603a4b8fadf24d23ac9c224927644c9d" - }, - { - "@id": "_:N698cebdfba864777b23d25052c4d2493" + "@id": "_:N258e312c37aa4354bed73603ef7a36f6" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6275,16 +6376,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Spoofing" + "@value": "Something that acts as or causes Erroneous System Use" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6295,28 +6393,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Spoofing" - } - ] - }, - { - "@id": "_:N603a4b8fadf24d23ac9c224927644c9d", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Erroneous System Use" } ] }, { - "@id": "_:N698cebdfba864777b23d25052c4d2493", + "@id": "_:N258e312c37aa4354bed73603ef7a36f6", "@type": [ "https://schema.org/WebPage" ], @@ -6332,11 +6414,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#ReduceLikelihood", + "@id": "https://w3id.org/dpv/risk#7SeverityLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -6346,7 +6428,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6362,33 +6444,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReductionControl" + "@id": "https://w3id.org/dpv#Severity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that reduces the likelihood of an event" + "@value": "Scale with 7 Severity Levels from Extremely High to Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reduce Likelihood" + "@value": "7 Severity Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentOngoing", + "@id": "https://w3id.org/dpv/risk#Cryptojacking", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -6398,7 +6480,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N3adf839933da482c89a2828fc9743969" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6414,68 +6507,61 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident is ongoing i.e. still active" + "@value": "Something that acts as or causes Cryptojacking" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Ongoing" + "@value": "Cryptojacking" } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-ttl", + "@id": "_:N3adf839933da482c89a2828fc9743969", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/turtle/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/turtle" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - Turtle serialiation" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk/risk.ttl" + "@value": "ENISA Threat Landscape 2021" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "https://schema.org/url": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" } ] }, { - "@id": "https://w3id.org/dpv/risk#AvailabilityIncident", + "@id": "https://w3id.org/dpv/risk#causedByVulnerability", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" + ], + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Vulnerability" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6483,102 +6569,62 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk#Incident" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Incident" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident where the availability of information or system has been affected" + "@value": "Indicates the associated context (subject) is caused by the indicated vulnerability (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Availability Incident" + "@value": "caused by vulnerability" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk#LegalRisk", + "@id": "https://w3id.org/dpv/risk#risk-levels-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S1L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv#RiskConcept" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Risks and issues that have their basis in legal requirements and enforcement" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Legal Risk" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#HighLikelihood", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.75,xsd:decimal" + "@value": "0.14,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6594,102 +6640,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Level where Likelihood is High" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "High Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#isExploitedBy", - "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" - ], - "http://purl.org/dc/dcam/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Vulnerability" - } - ], - "http://purl.org/dc/dcam/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Threat" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the vulnerability (subject) is exploited by the indicated threat (object)" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "is exploited by" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Vulnerability" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Threat" + "@value": "Low Risk (RM7x7 S:1 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#CompromiseAccountCredentials", + "@id": "https://w3id.org/dpv/risk#LoseCredibility", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -6714,7 +6687,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nf877665a169e4a7eac29964fc15db245" + "@id": "_:N2c068c379d9b4c2b8da0937ad8be6a81" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6730,13 +6703,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Account Credentials to be compromised" + "@value": "Something that acts as or causes Loss of Credibility" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6747,28 +6720,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account Credentials" + "@value": "Lose of Credibility" } ] }, { - "@id": "_:Nf877665a169e4a7eac29964fc15db245", + "@id": "_:N2c068c379d9b4c2b8da0937ad8be6a81", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L1", + "@id": "https://w3id.org/dpv/risk#RM5x5S2L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -6787,7 +6760,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.12,xsd:decimal" + "@value": "0.40,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6803,13 +6776,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6820,16 +6793,15 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:6 L:1)" + "@value": "High Risk (RM5x5 S:2 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L7", + "@id": "https://w3id.org/dpv/risk#IncidentStatus", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/contributor": [ { @@ -6839,12 +6811,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-02-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/vocab/vann/example": [ { - "@value": "0.14,xsd:decimal" + "@id": "https://w3id.org/dpv/examples#E0069" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6852,6 +6824,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#Status" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -6860,49 +6837,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv#Status" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low" + "@value": "Status associated with an incident" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:1 L:7)" + "@value": "Incident Status" } ] }, { - "@id": "https://w3id.org/dpv/risk#VeryHighRisk", + "@id": "https://w3id.org/dpv/risk#ComponentMalfunction", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.9,xsd:decimal" - } + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -6917,42 +6878,42 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" }, { - "@id": "https://w3id.org/dpv/risk#5RiskLevels" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Very High" + "@value": "Something that acts as or causes Component Malfunction" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk" + "@value": "Component Malfunction" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" + "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of" } ] }, { - "@id": "https://w3id.org/dpv/risk#SystemMalfunction", + "@id": "https://w3id.org/dpv/risk#RM7x7S3L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -6965,15 +6926,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N1c2325e64024454ebc2e79f9e388cf3b" + "@value": "0.06,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6989,51 +6944,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Malfunction" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Malfunction" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here system refers to both hardware and software systems" - } - ] - }, - { - "@id": "_:N1c2325e64024454ebc2e79f9e388cf3b", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Extremely Low Risk (RM7x7 S:3 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L5", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -7052,7 +6985,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.31,xsd:decimal" + "@value": "0.71,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7074,7 +7007,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7085,51 +7018,36 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:3 L:5)" + "@value": "Extremely High Risk (RM7x7 S:7 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-html", + "@id": "https://w3id.org/dpv/risk#RiskManagement", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ + "http://purl.org/dc/terms/created": [ { - "@value": "Risk Concepts - HTML serialiation" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-06-12" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/risk/risk.html" + "@language": "en", + "@value": "ISO 31073:2022 Risk management vocabulary" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/specification" + "@id": "https://w3id.org/dpv/risk#" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#AvailabilityBreach", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7138,23 +7056,30 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/risk#DataBreach" + "@language": "en", + "@value": "Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Risk Management" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S3L2", + "@id": "https://w3id.org/dpv/risk#ExtremelyHighLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -7164,12 +7089,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.24,xsd:decimal" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7185,33 +7110,39 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" + "@value": "Level where Likelihood is Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:3 L:2)" + "@value": "Extremely High Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#Extorsion", + "@id": "https://w3id.org/dpv/risk#ExtremelyLowRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -7221,18 +7152,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N40f94dff19814aa6ae7d3074eb3409d8" + "@value": "0.01,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7248,49 +7173,39 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#7RiskLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Extorsion" + "@value": "Level where Risk is Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extorsion" - } - ] - }, - { - "@id": "_:N40f94dff19814aa6ae7d3074eb3409d8", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "Extremely Low Risk" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#RemoveConsequence", + "@id": "https://w3id.org/dpv/risk#RM7x7S5L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -7300,7 +7215,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.61,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7316,33 +7236,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConsequenceControl" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that removes Consequence i.e. prevents it from materialising" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remove Consequence" + "@value": "Extremely High Risk (RM7x7 S:5 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L6", + "@id": "https://w3id.org/dpv/risk#UnauthorisedDataDisclosure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -7355,9 +7275,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.86,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N7c66233cabb64c2486ae612a1ff6b01d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7373,55 +7299,52 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High" + "@value": "Something that acts as or causes Unauthorised Data Disclosure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:7 L:6)" + "@value": "Unauthorised Data Disclosure" } ] }, { - "@id": "https://w3id.org/dpv/risk#PsychologicalHarm", + "@id": "_:N7c66233cabb64c2486ae612a1ff6b01d", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/modified": [ + "https://schema.org/name": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/source": [ + "https://schema.org/url": [ { - "@id": "_:N903ec696d7504183af4ba63f3f295e8e" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -7436,13 +7359,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Psychological Harm" + "@value": "Risks and issues that arise during operational processes" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7453,46 +7376,26 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Psychological Harm" - } - ] - }, - { - "@id": "_:N903ec696d7504183af4ba63f3f295e8e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Operational Security Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#exploitsVulnerability", + "@id": "https://w3id.org/dpv/risk#RemoveConsequence", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" - ], - "http://purl.org/dc/dcam/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Threat" - } + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7506,36 +7409,31 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ConsequenceControl" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the threat (subject) exploits the indicated vulnerability (object)" + "@value": "Control that removes Consequence i.e. prevents it from materialising" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "exploits vulnerability" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Threat" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@value": "Remove Consequence" } ] }, { - "@id": "https://w3id.org/dpv/risk#ConfidentialityIncident", + "@id": "https://w3id.org/dpv/risk#CrossBorderIncident", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" @@ -7570,7 +7468,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident where the confidentiality of information or system has been affected" + "@value": "Incident involving cross-border or multiple jurisdictions" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7581,12 +7479,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confidentiality Incident" + "@value": "Cross-Border Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S2L5", + "@id": "https://w3id.org/dpv/risk#RM5x5S1L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -7605,7 +7503,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.40,xsd:decimal" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7627,7 +7525,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7638,51 +7536,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:2 L:5)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IndividualRisk", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Risks and issues that affect or have the potential to affect specific individuals" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Individual Risk" + "@value": "Very Low Risk (RM5x5 S:1 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExtremelyLowRisk", + "@id": "https://w3id.org/dpv/risk#LoseReputation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -7692,75 +7555,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.01,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Level where Risk is Extremely Low" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Extremely Low Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L1", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/modified": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-08-16" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.14,xsd:decimal" + "@id": "_:N90d89ca8a8594ecabee31205aee25395" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7776,245 +7582,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low" + "@value": "Something that acts as or causes Loss of Reputation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:7 L:1)" + "@value": "Lose of Reputation" } ] }, { - "@id": "https://w3id.org/dpv/risk", + "@id": "_:N90d89ca8a8594ecabee31205aee25395", "@type": [ - "http://www.w3.org/2002/07/owl#Ontology", - "http://www.w3.org/ns/dx/prof/Profile" - ], - "http://purl.org/dc/terms/bibliographicCitation": [ - { - "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" - } - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@value": "http://www.w3.org/2000/01/rdf-schema" - }, - { - "@value": "http://www.w3.org/2004/02/skos/core" - } - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - }, - { - "@value": "Georg P. Krog" - }, - { - "@value": "Rob Brennan" - }, - { - "@value": "Beatriz Esteves" - }, - { - "@value": "Axel Polleres" - }, - { - "@value": "Fajar Ekaputra" - }, - { - "@value": "Delaram Golpayegani" - }, - { - "@value": "Julian Flake" - }, - { - "@value": "Julio Fernandez" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@language": "en", - "@value": "2022-08-14" - } - ], - "http://purl.org/dc/terms/creator": [ - { - "@language": "en", - "@value": "Harshvardhan J. Pandit" - }, - { - "@language": "en", - "@value": "Georg P. Krog" - }, - { - "@language": "en", - "@value": "Paul Ryan" - }, - { - "@language": "en", - "@value": "Rob Brennan" - }, - { - "@language": "en", - "@value": "Delaram Golpayegani" - }, - { - "@language": "en", - "@value": "Beatriz Esteves" - }, - { - "@language": "en", - "@value": "Julian Flake" - } - ], - "http://purl.org/dc/terms/description": [ - { - "@language": "en", - "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" - } - ], - "http://purl.org/dc/terms/identifier": [ - { - "@value": "https://w3id.org/dpv/risk" - } - ], - "http://purl.org/dc/terms/issued": [ - { - "@language": "en", - "@value": "2022-08-14" - } - ], - "http://purl.org/dc/terms/license": [ - { - "@id": "https://www.w3.org/copyright/document-license-2023/" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@language": "en", - "@value": "2024-07-13" - } - ], - "http://purl.org/dc/terms/publisher": [ - { - "@id": "https://www.w3.org/" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "https://www.w3.org/groups/cg/dpvcg/" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@language": "en", - "@value": "Risk Concepts" - } - ], - "http://purl.org/ontology/bibo/doi": [ - { - "@value": "10.5281/zenodo.12505841" - } - ], - "http://purl.org/ontology/bibo/status": [ - { - "@value": "http://purl.org/ontology/bibo/status/published" - } - ], - "http://purl.org/vocab/vann/preferredNamespacePrefix": [ - { - "@value": "risk" - } - ], - "http://purl.org/vocab/vann/preferredNamespaceUri": [ - { - "@value": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#Label": [ - { - "@language": "en", - "@value": "RISK" - } - ], - "http://www.w3.org/2002/07/owl#versionIRI": [ - { - "@id": "https://w3id.org/dpv/2.1-dev/risk" - } - ], - "http://www.w3.org/2002/07/owl#versionInfo": [ - { - "@value": "2.1-dev" - } - ], - "http://www.w3.org/ns/dx/prof/hasResource": [ - { - "@id": "https://w3id.org/dpv/primer" - }, - { - "@id": "https://w3id.org/dpv/guides" - }, - { - "@id": "https://w3id.org/dpv/examples" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-html" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-rdf" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-ttl" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-n3" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-jsonld" - } - ], - "http://www.w3.org/ns/dx/prof/isProfileOf": [ - { - "@id": "http://www.w3.org/2000/01/rdf-schema#" - }, - { - "@id": "http://www.w3.org/2004/02/skos/core#" - }, - { - "@id": "https://w3id.org/dpv" - } + "https://schema.org/WebPage" ], - "http://xmlns.com/foaf/0.1/logo": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/media/logo.png" + "@value": "ISO/IEC 27005:2018" } ], - "https://schema.org/version": [ + "https://schema.org/url": [ { - "@value": "2.1-dev" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingLegalObligation", + "@id": "https://w3id.org/dpv/risk#ExtremelyHighRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -8024,18 +7634,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Naf3bb0ebde894641a8c0a69545e7f6cc" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8046,56 +7650,40 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#7RiskLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Legal Obligations" + "@value": "Level where Risk is Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Legal Obligations" + "@value": "Extremely High Risk" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0" - } - ] - }, - { - "@id": "_:Naf3bb0ebde894641a8c0a69545e7f6cc", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#Scam", + "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -8120,7 +7708,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N498890541a5449e290f0aea406ea5090" + "@id": "_:Nc4c391b305be479eb0e623d887a478ac" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8135,6 +7723,9 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -8142,7 +7733,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Scam" + "@value": "Something that acts as or causes Unauthorised Code Disclosure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8153,88 +7744,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Scam" + "@value": "Unauthorised Code Disclosure" } ] }, { - "@id": "_:N498890541a5449e290f0aea406ea5090", + "@id": "_:Nc4c391b305be479eb0e623d887a478ac", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RiskControl", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples#E0071" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv#RiskMitigationMeasure" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv#RiskMitigationMeasure" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Control that modifies risk" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Risk Control" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#EquipmentFailure", + "@id": "https://w3id.org/dpv/risk#RM5x5S1L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -8247,15 +7782,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nc281053cb7ff4095b5eef42624c4ff46" + "@value": "0.04,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8271,51 +7800,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Equipment Failure" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Equipment Failure" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here equipment refers to physical equipment" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low" } - ] - }, - { - "@id": "_:Nc281053cb7ff4095b5eef42624c4ff46", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "Very Low Risk (RM5x5 S:1 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#ChangeConsequence", + "@id": "https://w3id.org/dpv/risk#MonitorImpact", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -8345,13 +7852,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConsequenceControl" + "@id": "https://w3id.org/dpv/risk#MonitorControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that changes Consequence" + "@value": "Control that monitors a Risk Impact" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8362,12 +7869,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Change Consequence" + "@value": "Monitor Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S2L2", + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -8384,11 +7891,6 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.44,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -8402,13 +7904,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#RiskMatrix" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8419,12 +7921,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM3x3 S:2 L:2)" + "@value": "Risk Matrix 5x5" } ] }, { - "@id": "https://w3id.org/dpv/risk#ComponentMalfunction", + "@id": "https://w3id.org/dpv/risk#UserRisks", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -8443,13 +7945,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Component Malfunction" + "@value": "Concepts associated with risks that arise due to User or Human use" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8460,22 +7962,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Component Malfunction" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of" + "@value": "User Risks" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S3L3", + "@id": "https://w3id.org/dpv/risk#IncidentStatusUnknown", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#IncidentStatus" ], "http://purl.org/dc/terms/contributor": [ { @@ -8485,12 +7981,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.36,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8506,29 +7997,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#IncidentStatus" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "The status of a incident is unknown" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:3 L:3)" + "@value": "Incident Status Unknown" } ] }, { - "@id": "https://w3id.org/dpv/risk#FinancialImpact", + "@id": "https://w3id.org/dpv/risk#SecurityAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -8547,13 +8038,22 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Things that cause or have the potential to impact financial resources" + "@value": "Something that acts as or causes an attack on security with the aim of undermining it" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8564,20 +8064,26 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Impact" + "@value": "Security Attack" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentReport", + "@id": "https://w3id.org/dpv/risk#3SeverityLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#Severity" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8585,11 +8091,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv#RecordsOfActivities" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -8598,29 +8099,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RecordsOfActivities" + "@id": "https://w3id.org/dpv#Severity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Documented information about an incident, its handling, assessments,and notifications" + "@value": "Scale with 3 Severity Levels from High to Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Report" + "@value": "3 Severity Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#MonitorControl", + "@id": "https://w3id.org/dpv/risk#HaltSource", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -8650,13 +8151,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#SourceControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that uses controls to monitor events" + "@value": "Control that halts the risk source or prevents it from materialising" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8667,22 +8168,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Control" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised." + "@value": "Halt Source" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L3", + "@id": "https://w3id.org/dpv/risk#CompromiseAccount", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -8695,9 +8190,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.24,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N252928e4ed0f4c6ea83876f7fb2c3d78" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8713,33 +8214,58 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" + "@value": "Something that acts as or causes a compromised account that is then used by the compromiser" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:4 L:3)" + "@value": "Compromise Account" } ] }, { - "@id": "https://w3id.org/dpv/risk#AvoidSource", + "@id": "_:N252928e4ed0f4c6ea83876f7fb2c3d78", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#VeryHighRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -8749,7 +8275,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.9,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8765,29 +8296,99 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SourceControl" + "@id": "https://w3id.org/dpv/risk#7RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5RiskLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that avoids the risk source" + "@value": "Level where Risk is Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Avoid Source" + "@value": "Very High Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedDataModification", + "@id": "https://w3id.org/dpv/risk#exploitsVulnerability", + "@type": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" + ], + "http://purl.org/dc/dcam/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Threat" + } + ], + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Vulnerability" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Indicates the threat (subject) exploits the indicated vulnerability (object)" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#core-properties" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "exploits vulnerability" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Threat" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Vulnerability" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#PersonalSafetyEndangerment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -8812,7 +8413,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Naa83e8f3fb5e4e9a88398292112d68f3" + "@id": "_:Na783f8da28594e8794173492db9ecac9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8828,13 +8429,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Modification" + "@value": "Something that acts as or causes Personal Safety Endangerment" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8845,38 +8446,48 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Modification" + "@value": "Personal Safety Endangerment" } ] }, { - "@id": "_:Naa83e8f3fb5e4e9a88398292112d68f3", + "@id": "_:Na783f8da28594e8794173492db9ecac9", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity", + "@id": "https://w3id.org/dpv/risk#EnvironmentalIncident", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#Incident" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -8885,29 +8496,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Activity" + "@value": "Incident caused due to environmental factors outside human controls" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Activity" + "@value": "Environmental Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L1", + "@id": "https://w3id.org/dpv/risk#RM5x5S3L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -8926,7 +8537,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.06,xsd:decimal" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8942,13 +8553,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8959,12 +8570,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:3 L:1)" + "@value": "Moderate Risk (RM5x5 S:3 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#IllegalDataProcessing", + "@id": "https://w3id.org/dpv/risk#Detriment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -8972,13 +8583,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-23" } ], "http://purl.org/dc/terms/modified": [ @@ -8987,11 +8598,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N83bd5296b4d94804a73f0e0518c39495" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -9011,7 +8617,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Illegal Processing of Data" + "@value": "Something that acts as or causes Detriment" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -9022,38 +8628,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Illegal Data Processing" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N83bd5296b4d94804a73f0e0518c39495", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Detriment" } ] }, { - "@id": "https://w3id.org/dpv/risk#ConfidentialityBreach", + "@id": "https://w3id.org/dpv/risk#RM7x7S5L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -9066,15 +8650,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N804ad242900c474395dd117c74dace8e" + "@value": "0.31,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9090,40 +8668,24 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#DataBreach" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Confidentiality Breach" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confidentiality Breach" - } - ] - }, - { - "@id": "_:N804ad242900c474395dd117c74dace8e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Moderate Risk (RM7x7 S:5 L:3)" } ] }, @@ -9163,11 +8725,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#VeryHighLikelihood", + "@id": "https://w3id.org/dpv/risk#Blackmail", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -9177,12 +8739,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.9,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N72e00e4999f548eb88bf909311860524" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9198,58 +8766,62 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" }, { - "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Very High" + "@value": "Something that acts as or causes Blackmail" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Likelihood" + "@value": "Blackmail" } + ] + }, + { + "@id": "_:N72e00e4999f548eb88bf909311860524", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#Compensation", + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9265,33 +8837,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv#Likelihood" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms" + "@value": "Scale with 7 Likelihood Levels from Extremely High to Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compensation" + "@value": "7 Likelihood Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -9301,13 +8873,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.04,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9323,55 +8894,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Non-Material Damage" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Non-Material Damage" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" + "@value": "Extremely Low Risk (RM7x7 S:2 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Misuse", + "@id": "https://w3id.org/dpv/risk#HighLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Delaram Golpayegani" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-06-11" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.75,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9387,33 +8951,45 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UserRisks" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Misuse" + "@value": "Level where Likelihood is High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Misuse" + "@value": "High Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#ImpactControl", + "@id": "https://w3id.org/dpv/risk#RM3x3S1L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -9423,7 +8999,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.33,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9439,37 +9020,42 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that controls Impacts" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Impact Control" + "@value": "Moderate Risk (RM3x3 S:1 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentConcludingReport", + "@id": "https://w3id.org/dpv/risk#hasControl", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" + ], + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#RiskControl" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9477,66 +9063,75 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk#IncidentReport" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#IncidentReport" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known" + "@value": "Indicates the use of specified control" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Concluding Report" + "@value": "has control" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#RiskControl" } ] }, { - "@id": "https://w3id.org/dpv/risk#core-properties", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#CrossBorderIncident", + "@id": "https://w3id.org/dpv/risk#DataBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk#" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "_:N0353966748ad43cc9b9c03081ec6b6f9" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples#E0069" + }, + { + "@id": "https://w3id.org/dpv/examples#E0071" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9547,33 +9142,58 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#SecurityBreach" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident involving cross-border or multiple jurisdictions" + "@value": "Something that acts as or causes Data Breach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cross-Border Incident" + "@value": "Data Breach" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExtremelyHighRisk", + "@id": "_:N0353966748ad43cc9b9c03081ec6b6f9", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#MalwareAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -9583,12 +9203,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.99,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6fb9cc1510c4401a9c582949b7a8c8b7" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9604,60 +9230,74 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Extremely High" + "@value": "Something that acts as or causes Malware Attack" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" + "@value": "Malware Attack" } ] }, { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes", + "@id": "_:N6fb9cc1510c4401a9c582949b7a8c8b7", "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L6", + "@id": "https://w3id.org/dpv/risk#RightsExercisePrevention", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.12,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9673,29 +9313,35 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low" + "@value": "Something that acts as or causes Prevent Exercising of Rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:1 L:6)" + "@value": "Prevent Exercising of Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S4L5", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -9714,7 +9360,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.80,xsd:decimal" + "@value": "0.04,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9730,13 +9376,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -9747,12 +9393,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:4 L:5)" + "@value": "Extremely Low Risk (RM7x7 S:1 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedDataAccess", + "@id": "https://w3id.org/dpv/risk#SystemFailure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -9777,7 +9423,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nc799e152712d4ee48d59c2a1366fca7f" + "@id": "_:Nd794c9a0064e4fe6bb3a0ebd38859b9b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9793,13 +9439,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Access" + "@value": "Something that acts as or causes System Failure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -9810,32 +9459,38 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Access" + "@value": "System Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here system refers to both hardware and software systems" } ] }, { - "@id": "_:Nc799e152712d4ee48d59c2a1366fca7f", + "@id": "_:Nd794c9a0064e4fe6bb3a0ebd38859b9b", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L3", + "@id": "https://w3id.org/dpv/risk#IncidentMitigated", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#IncidentStatus" ], "http://purl.org/dc/terms/contributor": [ { @@ -9845,12 +9500,53 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-02-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.06,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#IncidentStatus" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#incident-status-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Incident Mitigated" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IncidentHandlingReport", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9858,6 +9554,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#IncidentReport" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -9866,29 +9567,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low" + "@value": "A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:1 L:3)" + "@value": "Incident Handling Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#SecurityBreach", + "@id": "https://w3id.org/dpv/risk#DataCorruption", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -9913,7 +9614,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nee086e9da9f643e2837c115c27f1cabc" + "@id": "_:N8aaec0d1fefb4744abcf3099509b1988" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9924,10 +9625,13 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, { "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } @@ -9935,7 +9639,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Security Breach" + "@value": "Something that acts as or causes Corruption of Data" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -9946,12 +9650,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Security Breach" + "@value": "Data Corruption" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"Corruption Data\" in DPV 2.0" } ] }, { - "@id": "_:Nee086e9da9f643e2837c115c27f1cabc", + "@id": "_:N8aaec0d1fefb4744abcf3099509b1988", "@type": [ "https://schema.org/WebPage" ], @@ -9967,7 +9677,38 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemModification", + "@id": "https://w3id.org/dpv/risk#serialisation-rdf", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - RDF/XML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.rdf" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Misuse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -9975,13 +9716,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Delaram Golpayegani" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-06-11" } ], "http://purl.org/dc/terms/modified": [ @@ -9990,11 +9731,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N0c47798cd08a44d790a99ee3c58dcfb9" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -10008,13 +9744,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised System Modification" + "@value": "Something that acts as or causes Misuse" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10025,83 +9761,89 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised System Modification" + "@value": "Misuse" } ] }, { - "@id": "_:N0c47798cd08a44d790a99ee3c58dcfb9", + "@id": "https://w3id.org/dpv/risk#IncidentTerminated", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#IncidentStatus" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/guides", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.w3.org/TR/html/" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@value": "Guides for Data Privacy Vocabulary" + "@id": "https://w3id.org/dpv/risk#IncidentStatus" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/guides" + "@language": "en", + "@value": "The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Incident Terminated" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentSuspectedReport", + "@id": "https://w3id.org/dpv/risk#SocialDisadvantage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-19" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk#" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10112,33 +9854,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the suspicion of an incident in the past or occuring" + "@value": "Something that acts as or causes Social Disadvantage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Suspected Report" + "@value": "Social Disadvantage" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentConcluded", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -10148,7 +9890,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.14,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10164,33 +9911,68 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Concluded" + "@value": "Low Risk (RM7x7 S:7 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7", + "@id": "https://w3id.org/dpv/risk#PhysicalHarm", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#IndividualRisk" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Physical Harm" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Reidentification", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -10200,7 +9982,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-19" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10216,29 +10004,38 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types" + "@value": "Something that acts as or causes Re-identification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix 7x7" + "@value": "Re-identification" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification" } ] }, { - "@id": "https://w3id.org/dpv/risk#SystemFailure", + "@id": "https://w3id.org/dpv/risk#Spoofing", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -10263,7 +10060,10 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ndb0e0e85d6ad4dabbf9efc7a0f2cb59a" + "@id": "_:N539160303302464aa341bdfa53068f22" + }, + { + "@id": "_:N0085b3ac0b474cf1a64eccdff3718c8d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10278,6 +10078,15 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + }, { "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } @@ -10285,7 +10094,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Failure" + "@value": "Something that acts as or causes Spoofing" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10295,35 +10104,45 @@ ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@language": "en", - "@value": "System Failure" + "@language": "en", + "@value": "Spoofing" + } + ] + }, + { + "@id": "_:N539160303302464aa341bdfa53068f22", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Here system refers to both hardware and software systems" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "_:Ndb0e0e85d6ad4dabbf9efc7a0f2cb59a", + "@id": "_:N0085b3ac0b474cf1a64eccdff3718c8d", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeModification", + "@id": "https://w3id.org/dpv/risk#Compensation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -10331,13 +10150,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], "http://purl.org/dc/terms/modified": [ @@ -10346,11 +10165,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N8ae12eb2b96a4c7e97a8739ee00ffe80" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -10364,13 +10178,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Modification" + "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10381,46 +10195,40 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Modification" + "@value": "Compensation" } ] }, { - "@id": "_:N8ae12eb2b96a4c7e97a8739ee00ffe80", + "@id": "https://w3id.org/dpv/risk#refersToRisk", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" ], - "https://schema.org/name": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@id": "https://w3id.org/dpv#Incident" } ], - "https://schema.org/url": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@id": "https://w3id.org/dpv#Risk" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#DeliberateIncident", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/vocab/vann/example": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/examples#E0069" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10429,45 +10237,45 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Incident" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident caused due to deliberate actions of a human" + "@value": "Indicates the incident (subject) is a materialisation of the indicated risk (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Deliberate Incident" + "@value": "refers to risk" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv#Incident" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv#Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentStatusUnknown", + "@id": "https://w3id.org/dpv/risk#RemedyControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10483,33 +10291,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The status of a incident is unknown" + "@value": "Control to remedy consequences of event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Status Unknown" + "@value": "Remedy Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#ModerateSeverity", + "@id": "https://w3id.org/dpv/risk#ViolatingStatutoryObligations", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -10519,12 +10327,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.5,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Ne3511d0b904a403e93b1538888ad1023" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10535,61 +10349,60 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3SeverityLevels" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Moderate" + "@value": "Something that acts as or causes Violation of Statutory Obligations" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Severity" + "@value": "Violation of Statutory Obligations" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" + "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentMitigated", + "@id": "_:Ne3511d0b904a403e93b1538888ad1023", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IndividualHealthSafety", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -10604,42 +10417,31 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Mitigated" + "@value": "Individual Health & Safety" } ] }, { - "@id": "https://w3id.org/dpv/risk#hasControl", + "@id": "https://w3id.org/dpv/risk#DeliberateIncident", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" - ], - "http://purl.org/dc/dcam/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#RiskControl" - } + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10647,51 +10449,50 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#Incident" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#Incident" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the use of specified control" + "@value": "Incident caused due to deliberate actions of a human" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has control" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@value": "Deliberate Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#ReduceSeverity", + "@id": "https://w3id.org/dpv/risk#Vulnerability", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10699,41 +10500,41 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@language": "en", - "@value": "accepted" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/risk#ReductionControl" + "@language": "en", + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that reduces the severity of an event" + "@value": "Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reduce Severity" + "@value": "Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S1L4", + "@id": "https://w3id.org/dpv/risk#ShareRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -10743,12 +10544,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.16,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10764,33 +10560,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" + "@value": "Risk Mitigation Measure that shares Risk e.g. amongst stakeholders" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:1 L:4)" + "@value": "Share Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S2L3", + "@id": "https://w3id.org/dpv/risk#MonitorConsequence", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -10800,12 +10596,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.67,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10821,47 +10612,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#MonitorControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + "@value": "Control that monitors a Risk Consequence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM3x3 S:2 L:3)" + "@value": "Monitor Consequence" } ] }, { - "@id": "https://w3id.org/dpv/risk#Threat", + "@id": "https://w3id.org/dpv/risk#HighRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskLevel" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-18" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "0.75,xsd:decimal" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#RiskSource" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10872,48 +10669,50 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskSource" + "@id": "https://w3id.org/dpv/risk#7RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3RiskLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk source event which causes Risk" + "@value": "Level where Risk is High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Threat" + "@value": "High Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S3L2", + "@id": "https://w3id.org/dpv/risk#RecoveryControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.67,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10929,43 +10728,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + "@value": "Control to recover from event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM3x3 S:3 L:2)" + "@value": "Recovery Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskManagement", + "@id": "https://w3id.org/dpv/risk#RM7x7S3L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-06-12" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@language": "en", - "@value": "ISO 31073:2022 Risk management vocabulary" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10973,41 +10777,41 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Management" + "@value": "Very Low Risk (RM7x7 S:3 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Reidentification", + "@id": "https://w3id.org/dpv/risk#ReduceSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -11017,13 +10821,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11039,35 +10837,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#ReductionControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Re-identification" + "@value": "Control that reduces the severity of an event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Re-identification" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification" + "@value": "Reduce Severity" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentMitigationMeasure", + "@id": "https://w3id.org/dpv/risk#ConfidentialityIncident", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" @@ -11085,7 +10877,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv#RiskMitigationMeasure" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11096,13 +10888,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskMitigationMeasure" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again" + "@value": "Incident where the confidentiality of information or system has been affected" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11113,32 +10905,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Mitigation Measure" + "@value": "Confidentiality Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L4", + "@id": "https://w3id.org/dpv/risk#AccidentalMisuse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.57,xsd:decimal" - } + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -11153,29 +10929,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High" + "@value": "Accidental Misuse" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:7 L:4)" + "@value": "Accidental Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L2", + "@id": "https://w3id.org/dpv/risk#RM7x7S6L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -11194,7 +10970,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.04,xsd:decimal" + "@value": "0.73,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11216,7 +10992,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11227,12 +11003,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:1 L:2)" + "@value": "Extremely High Risk (RM7x7 S:6 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S4L2", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -11251,7 +11027,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.32,xsd:decimal" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11267,13 +11043,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11284,47 +11060,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:4 L:2)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IndividualHealthSafety", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Individual Health & Safety" + "@value": "Very Low Risk (RM7x7 S:2 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#PhysicalAssault", + "@id": "https://w3id.org/dpv/risk#UnauthorisedReidentification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -11332,13 +11073,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-19" } ], "http://purl.org/dc/terms/modified": [ @@ -11347,11 +11088,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N4414613afa8c4456b9a9b6c3f17a7a0c" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -11365,13 +11101,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Physical Assault" + "@value": "Something that acts as or causes Unauthorised Re-Identification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11382,28 +11121,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Physical Assault" - } - ] - }, - { - "@id": "_:N4414613afa8c4456b9a9b6c3f17a7a0c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Unauthorised Re-Identification" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure", + "@id": "https://w3id.org/dpv/risk#PublicOrderBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -11428,7 +11151,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb2d6659136cf4d2fa881ae5798bf0e58" + "@id": "_:N1d102af8ecd94ce3a875a9a2a7e78bcc" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11444,13 +11167,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Information Disclosure" + "@value": "Something that acts as or causes Public Order Breach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11461,28 +11184,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Information Disclosure" + "@value": "Public Order Breach" } ] }, { - "@id": "_:Nb2d6659136cf4d2fa881ae5798bf0e58", + "@id": "_:N1d102af8ecd94ce3a875a9a2a7e78bcc", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#RightsImpact", + "@id": "https://w3id.org/dpv/risk#UnwantedDataDeletion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -11507,7 +11230,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N4e0b95db2d414e7588f607d2edf6902e" + "@id": "_:Nde382e9a51c445d69476b298827b1cbe" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11523,16 +11246,19 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" }, { - "@id": "https://w3id.org/dpv#Impact" + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Impact to Rights" + "@value": "Something that acts as or causes Unwanted Data Deletion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11543,18 +11269,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Impact to Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ImpactToRights\" in DPV 2.0" + "@value": "Unwanted Data Deletion" } ] }, { - "@id": "_:N4e0b95db2d414e7588f607d2edf6902e", + "@id": "_:Nde382e9a51c445d69476b298827b1cbe", "@type": [ "https://schema.org/WebPage" ], @@ -11570,11 +11290,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#DataBreach", + "@id": "https://w3id.org/dpv/risk#ReduceLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -11584,26 +11304,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N82834c9f1ecf4644ab2d9343a1169c62" - } - ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples#E0069" - }, - { - "@id": "https://w3id.org/dpv/examples#E0071" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11619,45 +11320,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SecurityBreach" + "@id": "https://w3id.org/dpv/risk#ReductionControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Data Breach" + "@value": "Control that reduces the likelihood of an event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Breach" - } - ] - }, - { - "@id": "_:N82834c9f1ecf4644ab2d9343a1169c62", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Reduce Likelihood" } ] }, { - "@id": "https://w3id.org/dpv/risk#Detriment", + "@id": "https://w3id.org/dpv/risk#Fee", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -11665,13 +11350,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" + "@value": "2024-04-14" } ], "http://purl.org/dc/terms/modified": [ @@ -11680,6 +11365,12 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "DGA 2.10" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -11688,18 +11379,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Detriment" + "@value": "Something that acts as or provides fees e.g. for using a service" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11710,12 +11401,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Detriment" + "@value": "Fee" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L4", + "@id": "https://w3id.org/dpv/risk#RM5x5S3L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -11734,7 +11425,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.24,xsd:decimal" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11750,13 +11441,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11767,26 +11458,29 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:3 L:4)" + "@value": "Very Low Risk (RM5x5 S:3 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseReputation", + "@id": "https://w3id.org/dpv/risk#Incident", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-02-14" + }, + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], "http://purl.org/dc/terms/modified": [ @@ -11795,9 +11489,12 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples#E0069" + }, { - "@id": "_:N0282f3114f5b4278b632620b9b954c7d" + "@id": "https://w3id.org/dpv/examples#E0070" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11805,6 +11502,14 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#RiskConcept" + }, + { + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -11813,49 +11518,42 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Reputation" + "@value": "An actual or occured event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" + }, + { + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Reputation" - } - ] - }, - { - "@id": "_:N0282f3114f5b4278b632620b9b954c7d", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Incident" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "Incident is realised or materialised risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingCodeOfConduct", + "@id": "https://w3id.org/dpv/risk#RM3x3S3L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -11868,15 +11566,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N3d2e8d97024142dca7a47b73cbb8097c" + "@value": "0.33,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11887,56 +11579,34 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Code of Conduct" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Code of Conduct" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N3d2e8d97024142dca7a47b73cbb8097c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Moderate Risk (RM3x3 S:3 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#FinancialLoss", + "@id": "https://w3id.org/dpv/risk#SecurityBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -11961,7 +11631,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0296c48d481641d492572a05652b6bf5" + "@id": "_:Nb3034bc7cf1e485b85582c21529ebaa4" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11977,13 +11647,22 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity" + "@value": "Something that acts as or causes Security Breach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11994,12 +11673,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Loss" + "@value": "Security Breach" } ] }, { - "@id": "_:N0296c48d481641d492572a05652b6bf5", + "@id": "_:Nb3034bc7cf1e485b85582c21529ebaa4", "@type": [ "https://schema.org/WebPage" ], @@ -12015,11 +11694,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#HaltSource", + "@id": "https://w3id.org/dpv/risk#ModerateLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -12029,7 +11708,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.5,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12045,33 +11729,45 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SourceControl" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that halts the risk source or prevents it from materialising" + "@value": "Level where Likelihood is Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Halt Source" + "@value": "Moderate Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#HighRisk", + "@id": "https://w3id.org/dpv/risk#RiskMatrix", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv/risk#RiskAssessment" ], "http://purl.org/dc/terms/contributor": [ { @@ -12081,12 +11777,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-02-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.75,xsd:decimal" + "@id": "_:N99d1d0a8b80740559dacd97d8fb47665" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12102,45 +11798,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3RiskLevels" + "@id": "https://w3id.org/dpv/risk#RiskAssessment" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is High" + "@value": "Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other." } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk" + "@value": "Risk Matrix" + } + ] + }, + { + "@id": "_:N99d1d0a8b80740559dacd97d8fb47665", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "IEC 31010:2019" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" + "@value": "https://www.iso.org/standard/72140.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExtremelyLowLikelihood", + "@id": "https://w3id.org/dpv/risk#IncidentSuspected", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv/risk#IncidentStatus" ], "http://purl.org/dc/terms/contributor": [ { @@ -12150,12 +11850,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.01,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12171,35 +11866,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk#IncidentStatus" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Extremely Low" + "@value": "The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" + "@value": "Incident Suspected" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnwantedDisclosureData", + "@id": "https://w3id.org/dpv/risk#LoseGoodwill", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -12224,7 +11913,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N12b2c9394da44250a5ab771adc23fab8" + "@id": "_:N194bc10f01ef4bdb99f12487816e6826" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12240,13 +11929,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Disclosure of Data" + "@value": "Something that acts as or causes Loss of Goodwill" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -12257,12 +11946,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Disclosure of Data" + "@value": "Lose of Goodwill" } ] }, { - "@id": "_:N12b2c9394da44250a5ab771adc23fab8", + "@id": "_:N194bc10f01ef4bdb99f12487816e6826", "@type": [ "https://schema.org/WebPage" ], @@ -12278,11 +11967,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#LoseTrust", + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -12295,17 +11984,6 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nbb93cef662444084828d04948d35895d" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -12319,48 +11997,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Trust" + "@value": "A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Trust" - } - ] - }, - { - "@id": "_:Nbb93cef662444084828d04948d35895d", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Risk Matrix 3x3" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskAnalysis", + "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemModification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -12370,22 +12033,23 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:N837e146fba804365b9e619c05849f3d1" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "_:N029a97b214024c18a899586cb3864d2a" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#RiskAssessment" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12396,76 +12060,67 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskAssessment" + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures" + "@value": "Something that acts as or causes Unauthorised System Modification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Analysis" + "@value": "Unauthorised System Modification" } ] }, { - "@id": "_:N837e146fba804365b9e619c05849f3d1", + "@id": "_:N029a97b214024c18a899586cb3864d2a", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "IEC 31010:2019" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/72140.html" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#Incident", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - }, - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-17" } ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples#E0069" - }, + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/examples#E0070" + "@value": "0.29,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12473,14 +12128,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv#RiskConcept" - }, - { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -12489,38 +12136,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "An actual or occured event" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" - }, - { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Incident is realised or materialised risk" + "@value": "Moderate Risk (RM7x7 S:2 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L2", + "@id": "https://w3id.org/dpv/risk#RM7x7S6L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -12539,7 +12177,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.24,xsd:decimal" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12561,7 +12199,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -12572,17 +12210,39 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:6 L:2)" + "@value": "Very Low Risk (RM7x7 S:6 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#SocietalRisk", + "@id": "https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N89971235b5e34930a94f46c696e0ac94" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -12596,13 +12256,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that affect or have the potential to affect society at large or specific groups in society" + "@value": "Something that acts as or causes Unauthorised Information Disclosure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -12613,68 +12276,54 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Societal Risk" + "@value": "Unauthorised Information Disclosure" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentNearMiss", + "@id": "_:N89971235b5e34930a94f46c696e0ac94", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "accepted" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#SexualViolence", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "The state where an incident was almost successful in taking place i.e. \"it came very close\"" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "Incident Near Miss" + "@id": "_:Ncb4b4f28b9894b79bfd2a5d2dd41f88f" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IntentionalMisuse", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -12689,13 +12338,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UserRisks" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Intentional Misuse" + "@value": "Something that acts as or causes Sexual Violence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -12706,32 +12355,47 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Intentional Misuse" + "@value": "Sexual Violence" } ] }, { - "@id": "https://w3id.org/dpv/risk#Benefit", + "@id": "_:Ncb4b4f28b9894b79bfd2a5d2dd41f88f", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM3x3S2L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.22,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12747,33 +12411,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes benefits" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Benefit" + "@value": "Low Risk (RM3x3 S:2 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.86,xsd:decimal" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -12788,33 +12468,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that arise during operational processes" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Operational Security Risk" + "@value": "Extremely High Risk (RM7x7 S:7 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentHalted", + "@id": "https://w3id.org/dpv/risk#MonitorRiskControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -12824,7 +12504,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12840,37 +12520,75 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" + "@id": "https://w3id.org/dpv/risk#MonitorControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident has halted or paused with a high likelihood of resuming or recurring" + "@value": "Control that monitors another Control" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Halted" + "@value": "Monitor Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#Vulnerability", + "@id": "https://w3id.org/dpv/risk#core-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-jsonld", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/json-ld11/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/application/ld+json" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - JSON-LD serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.jsonld" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IdentificationControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12878,45 +12596,50 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskControl" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk" + "@value": "Control to identify characteristics of event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Vulnerability" + "@value": "Identification Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentPreliminaryReport", + "@id": "https://w3id.org/dpv/risk#isVulnerabilityOf", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" + ], + "http://purl.org/dc/dcam/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Vulnerability" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12924,46 +12647,41 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk#IncidentReport" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#IncidentReport" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known" + "@value": "Indicates the vulnerability (subject) is associated with indicated context (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Preliminary Report" + "@value": "is vulnerability of" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L4", + "@id": "https://w3id.org/dpv/risk#ChangeConsequence", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -12973,12 +12691,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.08,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12994,29 +12707,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#ConsequenceControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low" + "@value": "Control that changes Consequence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:1 L:4)" + "@value": "Change Consequence" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L1", + "@id": "https://w3id.org/dpv/risk#RM5x5S5L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -13035,7 +12748,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.08,xsd:decimal" + "@value": "0.40,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13051,13 +12764,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -13068,32 +12781,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:4 L:1)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RM3x3S3L3", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.99,xsd:decimal" + "@value": "High Risk (RM5x5 S:5 L:2)" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -13108,33 +12805,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High" + "@value": "Concepts associated with security threats that are likely to originate externally" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM3x3 S:3 L:3)" + "@value": "External Security Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk#VeryLowRisk", + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -13144,12 +12841,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.1,xsd:decimal" + "@value": "2022-08-17" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13165,42 +12857,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5RiskLevels" + "@id": "https://w3id.org/dpv/risk#RiskMatrix" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Very Low" + "@value": "A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" + "@value": "Risk Matrix 7x7" } ] }, { - "@id": "https://w3id.org/dpv/risk#ErroneousSystemUse", + "@id": "https://w3id.org/dpv/risk#IncidentOngoing", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#IncidentStatus" ], "http://purl.org/dc/terms/contributor": [ { @@ -13210,18 +12893,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Ne874eff2b0f74da79392c36cf77d71f1" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13237,49 +12909,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UserRisks" + "@id": "https://w3id.org/dpv/risk#IncidentStatus" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Erroneous System Use" + "@value": "The incident is ongoing i.e. still active" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Erroneous System Use" - } - ] - }, - { - "@id": "_:Ne874eff2b0f74da79392c36cf77d71f1", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Incident Ongoing" } ] }, { - "@id": "https://w3id.org/dpv/risk#IdentityFraud", + "@id": "https://w3id.org/dpv/risk#RM5x5S5L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -13292,15 +12948,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nbc1a7f7ae94c4fde84913e9622b759f6" + "@value": "0.60,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13316,49 +12966,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Identity Fraud" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identity Fraud" - } - ] - }, - { - "@id": "_:Nbc1a7f7ae94c4fde84913e9622b759f6", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "High Risk (RM5x5 S:5 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L2", + "@id": "https://w3id.org/dpv/risk#AvoidSource", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -13368,12 +13002,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.16,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13389,47 +13018,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#SourceControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low" + "@value": "Control that avoids the risk source" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:4 L:2)" + "@value": "Avoid Source" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentAssessmentReport", + "@id": "https://w3id.org/dpv/risk#VeryLowRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskLevel" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "0.1,xsd:decimal" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13440,33 +13075,58 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#7RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5RiskLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the assessment of an incident in terms of its effects or impacts" + "@value": "Level where Risk is Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Assessment Report" + "@value": "Very Low Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#InternalSecurityThreat", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.29,xsd:decimal" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -13481,29 +13141,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Concepts associated with security threats and issues that originate within the organisation" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Internal Security Threat" + "@value": "Moderate Risk (RM7x7 S:7 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Cryptojacking", + "@id": "https://w3id.org/dpv/risk#LoseOpportunity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -13528,7 +13188,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Neb960f38438d48258bee0ebae96be48e" + "@id": "_:N2ea871931e3746e4aff469f67008e44f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13544,13 +13204,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Cryptojacking" + "@value": "Something that acts as or causes Loss of Opportunity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -13561,32 +13221,48 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cryptojacking" + "@value": "Lose of Opportunity" } ] }, { - "@id": "_:Neb960f38438d48258bee0ebae96be48e", + "@id": "_:N2ea871931e3746e4aff469f67008e44f", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Landscape 2021" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#IntegrityBreach", + "@id": "https://w3id.org/dpv/risk#HighSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#Severity" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.75,xsd:decimal" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -13595,47 +13271,65 @@ ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@language": "en", - "@value": "accepted" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3SeverityLevels" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Level where Severity is High" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "https://w3id.org/dpv/risk#DataBreach" + "@language": "en", + "@value": "High Severity" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L6", + "@id": "https://w3id.org/dpv/risk#IncidentOngoingReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.49,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13646,33 +13340,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" + "@value": "A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:4 L:6)" + "@value": "Incident Ongoing Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L6", + "@id": "https://w3id.org/dpv/risk#IncidentNearMiss", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#IncidentStatus" ], "http://purl.org/dc/terms/contributor": [ { @@ -13682,12 +13376,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.24,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13703,33 +13392,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#IncidentStatus" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate" + "@value": "The state where an incident was almost successful in taking place i.e. \"it came very close\"" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:2 L:6)" + "@value": "Incident Near Miss" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S1L1", + "@id": "https://w3id.org/dpv/risk#UnwantedDisclosureData", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -13742,9 +13431,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.11,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nf14815c8a8694940bcdb35d12bf37b11" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13760,74 +13455,68 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + "@value": "Something that acts as or causes Unwanted Disclosure of Data" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM3x3 S:1 L:1)" + "@value": "Unwanted Disclosure of Data" } ] }, { - "@id": "https://w3id.org/dpv/risk#UserRisks", + "@id": "_:Nf14815c8a8694940bcdb35d12bf37b11", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "accepted" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "https://schema.org/url": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#LowSeverity", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#Severity" ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/contributor": [ { - "@language": "en", - "@value": "Concepts associated with risks that arise due to User or Human use" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@language": "en", - "@value": "User Risks" + "@value": "0.25,xsd:decimal" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#Privacy", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -13842,27 +13531,45 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3SeverityLevels" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Level where Severity is Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Privacy" + "@value": "Low Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseGoodwill", + "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -13872,18 +13579,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N4f8237833a8141b2bb3c31cf5176bf42" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13899,49 +13595,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv#Likelihood" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Goodwill" + "@value": "Scale with 3 Likelihood Levels from High to Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Goodwill" - } - ] - }, - { - "@id": "_:N4f8237833a8141b2bb3c31cf5176bf42", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "3 Likelihood Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L5", + "@id": "https://w3id.org/dpv/risk#VeryLowSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -13951,12 +13631,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.51,xsd:decimal" + "@value": "0.1,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13972,33 +13652,42 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5SeverityLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" + "@value": "Level where Severity is Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:5 L:5)" + "@value": "Very Low Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#RemoveImpact", + "@id": "https://w3id.org/dpv/risk#MaliciousCodeAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -14008,7 +13697,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N625dc3c061c74eec9f96d171c60fd3c0" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14024,33 +13724,58 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ImpactControl" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that removes Impact i.e. prevents it from materialising" + "@value": "Something that acts as or causes Malicious Code Attack" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Malicious Code Attack" } + ] + }, + { + "@id": "_:N625dc3c061c74eec9f96d171c60fd3c0", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Remove Impact" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L2", + "@id": "https://w3id.org/dpv/risk#IdentityTheft", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -14063,9 +13788,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.20,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N33b7660d50a4461e927089957dfd848b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14081,64 +13812,52 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" + "@value": "Something that acts as or causes Identity Theft" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:5 L:2)" + "@value": "Identity Theft" } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-n3", + "@id": "_:N33b7660d50a4461e927089957dfd848b", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TeamSubmission/n3/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/n3" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - N3 serialiation" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk/risk.n3" + "@value": "ENISA Threat Taxonomy 2016" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "https://schema.org/url": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L3", + "@id": "https://w3id.org/dpv/risk#PsychologicalHarm", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -14151,9 +13870,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.31,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N0ddf524630684b719d7f03f907c20cff" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14169,49 +13894,64 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + "@value": "Something that acts as or causes Psychological Harm" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:5 L:3)" + "@value": "Psychological Harm" } ] }, { - "@id": "https://w3id.org/dpv/risk#Reward", + "@id": "_:N0ddf524630684b719d7f03f907c20cff", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S3L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.37,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14227,33 +13967,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reward" + "@value": "High Risk (RM7x7 S:3 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#SourceControl", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -14263,7 +14003,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14279,33 +14024,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that controls the Source" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Source Control" + "@value": "Extremely High Risk (RM7x7 S:7 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises", + "@id": "https://w3id.org/dpv/risk#ModerateRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -14315,18 +14060,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N2b8ae4e96b21406bb91bfdec8f460776" + "@value": "0.5,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14342,49 +14081,76 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#7RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3RiskLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Access to Premises" + "@value": "Level where Risk is Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Access to Premises" + "@value": "Moderate Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" } ] }, { - "@id": "_:N2b8ae4e96b21406bb91bfdec8f460776", + "@id": "https://w3id.org/dpv/risk#serialisation-ttl", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://www.w3.org/TR/turtle/" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/format": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://www.iana.org/assignments/media-types/text/turtle" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - Turtle serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.ttl" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseCustomerConfidence", + "@id": "https://w3id.org/dpv/risk#RM7x7S4L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -14397,15 +14163,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N0d138f94265e46f293490fbe0fc8074c" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14421,53 +14181,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Customer Confidence" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Customer Confidence" + "@value": "Moderate Risk (RM7x7 S:4 L:3)" } ] }, { - "@id": "_:N0d138f94265e46f293490fbe0fc8074c", + "@id": "https://w3id.org/dpv/risk#RightsViolation", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityIncident", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/modified": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14475,11 +14231,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk#Incident" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -14488,29 +14239,35 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident where the integrity of information or system has been affected" + "@value": "Something that acts as or causes Violation of Rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Integrity Incident" + "@value": "Violation of Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S1L2", + "@id": "https://w3id.org/dpv/risk#RM7x7S4L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -14529,7 +14286,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.08,xsd:decimal" + "@value": "0.57,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14545,13 +14302,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -14562,21 +14319,31 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:1 L:2)" + "@value": "Very High Risk (RM7x7 S:4 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#ReductionControl", + "@id": "https://w3id.org/dpv/risk#RM7x7S3L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14592,29 +14359,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that reduces the likelihood or severity of an event" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reduction Control" + "@value": "Moderate Risk (RM7x7 S:3 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#EquipmentMalfunction", + "@id": "https://w3id.org/dpv/risk#IllegalDataProcessing", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -14639,7 +14406,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N7f1dc230141c4448a99f28f362191020" + "@id": "_:Nfbea264abf694083a7d1db8b2101092b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14655,13 +14422,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Equipment Malfunction" + "@value": "Something that acts as or causes Illegal Processing of Data" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -14672,18 +14439,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Equipment Malfunction" + "@value": "Illegal Data Processing" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Here equipment refers to physical equipment" + "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0" } ] }, { - "@id": "_:N7f1dc230141c4448a99f28f362191020", + "@id": "_:Nfbea264abf694083a7d1db8b2101092b", "@type": [ "https://schema.org/WebPage" ], @@ -14699,11 +14466,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels", + "@id": "https://w3id.org/dpv/risk#DenialServiceAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -14713,7 +14480,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N8705162a41ca472c9e3867ec5902de25" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14729,33 +14507,52 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Likelihood" + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 7 Likelihood Levels from Extremely High to Extremely Low" + "@value": "Something that acts as or causes Denial of Service Attack (DoS)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "7 Likelihood Levels" + "@value": "Denial of Service Attack (DoS)" } ] }, { - "@id": "https://w3id.org/dpv/risk#3RiskLevels", + "@id": "_:N8705162a41ca472c9e3867ec5902de25", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#NonMaterialDamage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -14765,7 +14562,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-03-30" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14781,53 +14584,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskLevel" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 3 Risk Levels from High to Low" + "@value": "Something that acts as or causes Non-Material Damage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "3 Risk Levels" + "@value": "Non-Material Damage" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L6", + "@id": "https://w3id.org/dpv/risk#AccidentalIncident", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.61,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14838,29 +14641,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High" + "@value": "Incident caused due to accidental actions arising from human or human-controlled situations" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:5 L:6)" + "@value": "Accidental Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExtremelyHighSeverity", + "@id": "https://w3id.org/dpv/risk#5SeverityLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -14877,11 +14680,6 @@ "@value": "2022-08-18" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.99,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -14895,13 +14693,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" + "@id": "https://w3id.org/dpv#Severity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Extremely High" + "@value": "Scale with 5 Severity Levels from Very High to Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -14912,37 +14710,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" + "@value": "5 Severity Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S4L3", + "@id": "https://w3id.org/dpv/risk#Reward", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.48,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14958,36 +14751,36 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + "@value": "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:4 L:3)" + "@value": "Reward" } ] }, { - "@id": "https://w3id.org/dpv/risk#causedByThreat", + "@id": "https://w3id.org/dpv/risk#hasVulnerability", "@type": [ "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", "http://www.w3.org/2004/02/skos/core#Concept" ], "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk#Threat" + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ], "http://purl.org/dc/terms/created": [ @@ -15010,7 +14803,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the cause of associated context (subject) was the indicated threat (object)" + "@value": "Indicates the associated context (subject) has indicated vulnerability (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -15021,21 +14814,21 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "caused by threat" + "@value": "has vulnerability" } ], "https://schema.org/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk#Threat" + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L7", + "@id": "https://w3id.org/dpv/risk#ChangeImpact", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -15045,12 +14838,53 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.57,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ImpactControl" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Control that changes Impact" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Change Impact" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IncidentMitigationMeasure", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15058,6 +14892,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#RiskMitigationMeasure" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -15066,49 +14905,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv#RiskMitigationMeasure" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High" + "@value": "A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:4 L:7)" + "@value": "Incident Mitigation Measure" } ] }, { - "@id": "https://w3id.org/dpv/risk#RightsLimitation", + "@id": "https://w3id.org/dpv/risk#RM7x7S6L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.86,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15124,35 +14962,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Limitation of Rights" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Limitation of Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0" + "@value": "Extremely High Risk (RM7x7 S:6 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#DistributedDenialServiceAttack", + "@id": "https://w3id.org/dpv/risk#SystemIntrusion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -15177,7 +15009,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N842f6dd3b92c482180f56ce6a495c382" + "@id": "_:Ne8bd9725515e46d0a941f4a4665a7868" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15192,6 +15024,15 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -15199,7 +15040,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Distributed Denial of Service Attack (DDoS)" + "@value": "Something that acts as or causes System Intrusion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -15210,28 +15051,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Distributed Denial of Service Attack (DDoS)" + "@value": "System Intrusion" } ] }, { - "@id": "_:N842f6dd3b92c482180f56ce6a495c382", + "@id": "_:Ne8bd9725515e46d0a941f4a4665a7868", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L2", + "@id": "https://w3id.org/dpv/risk#RM5x5S2L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -15250,7 +15091,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.12,xsd:decimal" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15266,13 +15107,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -15283,16 +15124,15 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:3 L:2)" + "@value": "Low Risk (RM5x5 S:2 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S5L5", + "@id": "https://w3id.org/dpv/risk#RiskAnalysis", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/contributor": [ { @@ -15302,12 +15142,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.99,xsd:decimal" + "@id": "_:N943b082c5ba64ab4896c25d1bccf20cd" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15315,6 +15155,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#RiskAssessment" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -15323,33 +15168,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskAssessment" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High" + "@value": "A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:5 L:5)" + "@value": "Risk Analysis" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L7", + "@id": "_:N943b082c5ba64ab4896c25d1bccf20cd", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "IEC 31010:2019" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/72140.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#LoseCustomerConfidence", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -15362,9 +15223,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.86,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N669b51dd9b0f4a71983f16dfc274956a" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15380,29 +15247,45 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High" + "@value": "Something that acts as or causes Loss of Customer Confidence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:6 L:7)" + "@value": "Lose of Customer Confidence" } ] }, { - "@id": "https://w3id.org/dpv/risk#SexualViolence", + "@id": "_:N669b51dd9b0f4a71983f16dfc274956a", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#HumanErrors", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -15427,7 +15310,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nbeddee22b7a841e39879764ab63949f8" + "@id": "_:Na882c52257364f5896e5b38b50bb08fe" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15443,13 +15326,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Sexual Violence" + "@value": "Something that acts as or causes Human Errors" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -15460,12 +15343,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sexual Violence" + "@value": "Human Errors" } ] }, { - "@id": "_:Nbeddee22b7a841e39879764ab63949f8", + "@id": "_:Na882c52257364f5896e5b38b50bb08fe", "@type": [ "https://schema.org/WebPage" ], @@ -15481,11 +15364,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#UnwantedDataDeletion", + "@id": "https://w3id.org/dpv/risk#IncidentRegister", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/contributor": [ { @@ -15495,23 +15377,17 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-05-19" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "_:N7ff2bed0d152400e90aff3c52f1320b0" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv#RecordsOfActivities" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15522,58 +15398,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv#RecordsOfActivities" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Data Deletion" + "@value": "A register recording incidentes, their reports, notifications, and other related activities" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Data Deletion" + "@value": "Incident Register" } ] }, { - "@id": "_:N7ff2bed0d152400e90aff3c52f1320b0", + "@id": "https://w3id.org/dpv/risk#RM5x5S3L4", "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Harshvardhan J. Pandit" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#hasIncident", - "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "0.48,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15587,31 +15453,31 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates an incident is associated with the specified context" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has incident" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Incident" + "@value": "High Risk (RM5x5 S:3 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L7", + "@id": "https://w3id.org/dpv/risk#RM5x5S4L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -15630,7 +15496,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.99,xsd:decimal" + "@value": "0.48,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15646,13 +15512,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -15663,16 +15529,22 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:7 L:7)" + "@value": "High Risk (RM5x5 S:4 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#JudicialCosts", + "@id": "https://w3id.org/dpv/risk#DetectionControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskControl" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -15687,54 +15559,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that involves or causes judicial costs to be paid" + "@value": "Control to detect event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Judicial Costs" + "@value": "Detection Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#PublicOrderBreach", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N2bd2812bbacb46319d2bdb0e95e02f65" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15750,49 +15616,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Public Order Breach" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Public Order Breach" - } - ] - }, - { - "@id": "_:N2bd2812bbacb46319d2bdb0e95e02f65", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Extremely Low Risk (RM7x7 S:2 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#MaterialDamage", + "@id": "https://w3id.org/dpv/risk#VeryLowLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -15802,13 +15652,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.1,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15824,86 +15673,103 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Material Damage" + "@value": "Level where Likelihood is Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Material Damage" + "@value": "Very Low Likelihood" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" + "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-rdf", + "@id": "https://w3id.org/dpv/risk#isExploitedBy", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + "@id": "https://w3id.org/dpv/risk#Threat" } ], - "http://purl.org/dc/terms/title": [ + "http://purl.org/dc/terms/created": [ { - "@value": "Risk Concepts - RDF/XML serialiation" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk/risk.rdf" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@language": "en", + "@value": "accepted" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RM5x5S3L1", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@value": "Harshvardhan J. Pandit" + "@language": "en", + "@value": "Indicates the vulnerability (subject) is exploited by the indicated threat (object)" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "0.12,xsd:decimal" + "@language": "en", + "@value": "is exploited by" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Vulnerability" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Threat" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#FinancialImpact", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -15918,33 +15784,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Things that cause or have the potential to impact financial resources" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:3 L:1)" + "@value": "Financial Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S5L3", + "@id": "https://w3id.org/dpv/risk#Terrorism", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -15957,9 +15823,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.60,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N84e706a33b7c462194d2c8fb5c04326c" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15975,43 +15847,58 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High" + "@value": "Something that acts as or causes Terrorism" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:5 L:3)" + "@value": "Terrorism" } ] }, { - "@id": "https://w3id.org/dpv/risk#MonitorImpact", + "@id": "_:N84e706a33b7c462194d2c8fb5c04326c", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#causedByThreat", + "@type": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" + ], + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Threat" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16025,31 +15912,31 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#MonitorControl" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Impact" + "@value": "Indicates the cause of associated context (subject) was the indicated threat (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Impact" + "@value": "caused by threat" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S2L2", + "@id": "https://w3id.org/dpv/risk#RM5x5S5L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -16068,7 +15955,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.16,xsd:decimal" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16090,7 +15977,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -16101,17 +15988,39 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:2 L:2)" + "@value": "Very High Risk (RM5x5 S:5 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk", + "@id": "https://w3id.org/dpv/risk#ViolatingLegalObligation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N0b5dd4cc254540f49140434e86708abb" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -16120,18 +16029,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that affect the reputation of the organisation" + "@value": "Something that acts as or causes Violation of Legal Obligations" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -16142,16 +16051,38 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reputational Risk" + "@value": "Violation of Legal Obligations" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentSuspected", + "@id": "_:N0b5dd4cc254540f49140434e86708abb", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#FinancialLoss", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -16161,7 +16092,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N698d6b9272804e2dba685b14f6e69152" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16177,33 +16119,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing" + "@value": "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Suspected" + "@value": "Financial Loss" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S1L3", + "@id": "_:N698d6b9272804e2dba685b14f6e69152", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#SystemMalfunction", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -16216,9 +16174,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.12,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N18aeaa08367a4c56822793249e34feae" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16234,39 +16198,58 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low" + "@value": "Something that acts as or causes System Malfunction" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:1 L:3)" + "@value": "System Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here system refers to both hardware and software systems" } ] }, { - "@id": "https://w3id.org/dpv/risk#core-classes", + "@id": "_:N18aeaa08367a4c56822793249e34feae", "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } ] }, { - "@id": "https://w3id.org/dpv/risk#ExtremelyHighLikelihood", + "@id": "https://w3id.org/dpv/risk#RM5x5S4L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -16276,12 +16259,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.99,xsd:decimal" + "@value": "0.32,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16297,58 +16280,54 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Extremely High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" + "@value": "Moderate Risk (RM5x5 S:4 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#refersToRisk", + "@id": "https://w3id.org/dpv/risk#ViolenceAgainstChildren", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv#Incident" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv#Risk" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/modified": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-08-16" } ], - "http://purl.org/vocab/vann/example": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/examples#E0069" + "@id": "_:N50def33314ee4442bf7e77161e51165b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16362,54 +16341,77 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#IndividualRisk" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the incident (subject) is a materialisation of the indicated risk (object)" + "@value": "Something that acts as or causes Child Violence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "refers to risk" + "@value": "Violence against children" } ], - "https://schema.org/domainIncludes": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "https://w3id.org/dpv#Incident" + "@language": "en", + "@value": "This concept was called \"ChildViolence\" in DPV 2.0" + } + ] + }, + { + "@id": "_:N50def33314ee4442bf7e77161e51165b", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "https://schema.org/rangeIncludes": [ + "https://schema.org/url": [ { - "@id": "https://w3id.org/dpv#Risk" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentOngoingReport", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "0.08,xsd:decimal" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16420,29 +16422,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Ongoing Report" + "@value": "Very Low Risk (RM7x7 S:1 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeAccess", + "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeModification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -16467,7 +16469,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N8193907d23bd43dc8b146573989b8a0d" + "@id": "_:Ncecbd81981b3460f9cede6031d4ab8b1" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16482,6 +16484,9 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -16489,7 +16494,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Access" + "@value": "Something that acts as or causes Unauthorised Code Modification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -16500,12 +16505,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Access" + "@value": "Unauthorised Code Modification" } ] }, { - "@id": "_:N8193907d23bd43dc8b146573989b8a0d", + "@id": "_:Ncecbd81981b3460f9cede6031d4ab8b1", "@type": [ "https://schema.org/WebPage" ], @@ -16521,58 +16526,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentNotice", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv#Notice" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv#Notice" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Notice associated with an Incident" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#incident-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Incident Notice" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#AuthorisationFailure", + "@id": "https://w3id.org/dpv/risk#UnauthorisedResourceUse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -16597,7 +16551,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N8906a1d2a7bd4484854e88a2dc1b93a5" + "@id": "_:N605e2cac18a74200ab14cc33e319b6cb" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16613,13 +16567,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Authorisation Failure" + "@value": "Something that acts as or causes Unauthorised Resource Use" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -16630,28 +16587,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Authorisation Failure" + "@value": "Unauthorised Resource Use" } ] }, { - "@id": "_:N8906a1d2a7bd4484854e88a2dc1b93a5", + "@id": "_:N605e2cac18a74200ab14cc33e319b6cb", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISa Trust Services Security Incidents 2021" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S4L1", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -16670,7 +16627,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.16,xsd:decimal" + "@value": "0.10,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16686,13 +16643,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -16703,32 +16660,31 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:4 L:1)" + "@value": "Very Low Risk (RM7x7 S:1 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#SocialDisadvantage", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16744,33 +16700,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Social Disadvantage" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Social Disadvantage" + "@value": "Very Low Risk (RM7x7 S:1 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Damage", + "@id": "https://w3id.org/dpv/risk#RM7x7S5L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -16780,13 +16736,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16802,29 +16757,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Damage" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Damage" + "@value": "Low Risk (RM7x7 S:5 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S1L2", + "@id": "https://w3id.org/dpv/risk#RM5x5S1L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -16843,7 +16798,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.22,xsd:decimal" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16859,13 +16814,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -16876,16 +16831,78 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM3x3 S:1 L:2)" + "@value": "Low Risk (RM5x5 S:1 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S1L5", + "@id": "https://w3id.org/dpv/guides", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Guides for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/guides" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/primer", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Primer for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/primer" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#3RiskLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -16895,12 +16912,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.20,xsd:decimal" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16916,47 +16928,91 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv#RiskLevel" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low" + "@value": "Scale with 3 Risk Levels from High to Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:1 L:5)" + "@value": "3 Risk Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentIdentifier", + "@id": "https://w3id.org/dpv/risk#AvailabilityBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#DataBreach" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedDataModification", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk#" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/source": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "_:Nb76ee4ad00614561b02ea8b1fd3da77c" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16965,26 +17021,56 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Identifier associated with an incident" + "@value": "Something that acts as or causes Unauthorised Data Modification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Identifier" + "@value": "Unauthorised Data Modification" } ] }, { - "@id": "https://w3id.org/dpv/risk#Fraud", + "@id": "_:Nb76ee4ad00614561b02ea8b1fd3da77c", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeAccess", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -17009,7 +17095,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd4dde0f0f01e4d739b22630aa8ad7d7a" + "@id": "_:N99568e0cd3774d348d85262f04bc3a0b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17024,6 +17110,12 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -17031,7 +17123,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Fraud" + "@value": "Something that acts as or causes Unauthorised Code Access" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -17042,32 +17134,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Fraud" + "@value": "Unauthorised Code Access" } ] }, { - "@id": "_:Nd4dde0f0f01e4d739b22630aa8ad7d7a", + "@id": "_:N99568e0cd3774d348d85262f04bc3a0b", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#ChangeImpact", + "@id": "https://w3id.org/dpv/risk#IncidentConcluded", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#IncidentStatus" ], "http://purl.org/dc/terms/contributor": [ { @@ -17077,7 +17169,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17093,29 +17185,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ImpactControl" + "@id": "https://w3id.org/dpv/risk#IncidentStatus" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that changes Impact" + "@value": "The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Change Impact" + "@value": "Incident Concluded" } ] }, { - "@id": "https://w3id.org/dpv/risk#DenialServiceAttack", + "@id": "https://w3id.org/dpv/risk#DistributedDenialServiceAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -17140,10 +17232,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N51a29309d655420e8611a50e7d2baa7c" - }, - { - "@id": "_:Nf82ac345e0fe44a394f7da0ec78ef801" + "@id": "_:N64ebcf10636d495599fc0fd262e44103" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17158,6 +17247,9 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -17165,7 +17257,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Denial of Service Attack (DoS)" + "@value": "Something that acts as or causes Distributed Denial of Service Attack (DDoS)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -17176,12 +17268,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Denial of Service Attack (DoS)" + "@value": "Distributed Denial of Service Attack (DDoS)" } ] }, { - "@id": "_:N51a29309d655420e8611a50e7d2baa7c", + "@id": "_:N64ebcf10636d495599fc0fd262e44103", "@type": [ "https://schema.org/WebPage" ], @@ -17197,31 +17289,27 @@ ] }, { - "@id": "_:Nf82ac345e0fe44a394f7da0ec78ef801", + "@id": "https://w3id.org/dpv/risk#Damage", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-03-30" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ThreatSource", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/modified": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17229,37 +17317,37 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#LegalRisk" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Source of threat event, including both agent and non-agent sources" + "@value": "Something that acts as or causes Damage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Threat Source" + "@value": "Damage" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S3L1", + "@id": "https://w3id.org/dpv/risk#RM7x7S3L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -17278,7 +17366,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.33,xsd:decimal" + "@value": "0.31,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17294,13 +17382,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -17311,16 +17399,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM3x3 S:3 L:1)" + "@value": "High Risk (RM7x7 S:3 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L3", + "@id": "https://w3id.org/dpv/risk#LowLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -17330,12 +17418,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.43,xsd:decimal" + "@value": "0.25,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17351,29 +17439,41 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High" + "@value": "Level where Likelihood is Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:7 L:3)" + "@value": "Low Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingContractualObligation", + "@id": "https://w3id.org/dpv/risk#Renumeration", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -17381,13 +17481,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], "http://purl.org/dc/terms/modified": [ @@ -17396,11 +17496,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N1802c2900f5b4c578896c91c3149381d" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -17409,18 +17504,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Contractual Obligations" + "@value": "Something that acts as or provides renumeration which is in monetary or financial form" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -17431,38 +17526,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Contractual Obligation" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N1802c2900f5b4c578896c91c3149381d", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Remuneration" } ] }, { - "@id": "https://w3id.org/dpv/risk#ShareRisk", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -17472,7 +17545,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.02,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17488,29 +17566,70 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that shares Risk e.g. amongst stakeholders" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Share Risk" + "@value": "Extremely Low Risk (RM7x7 S:1 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L2", + "@id": "https://w3id.org/dpv/risk#JudicialCosts", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#FinancialImpact" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that involves or causes judicial costs to be paid" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Judicial Costs" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S3L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -17529,7 +17648,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.08,xsd:decimal" + "@value": "0.43,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17551,7 +17670,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -17562,12 +17681,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:2 L:2)" + "@value": "Very High Risk (RM7x7 S:3 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S3L5", + "@id": "https://w3id.org/dpv/risk#RM5x5S1L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -17586,7 +17705,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.60,xsd:decimal" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17608,7 +17727,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -17619,12 +17738,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:3 L:5)" + "@value": "Very Low Risk (RM5x5 S:1 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Blackmail", + "@id": "https://w3id.org/dpv/risk#ViolatingContractualObligation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -17649,7 +17768,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N3ef9f5a9eb554279905f69c263712205" + "@id": "_:N638499f1a35f4f94abab8a1e6e4bf97d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17660,55 +17779,97 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#LegalRisk" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Violation of Contractual Obligations" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Violation of Contractual Obligation" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0" + } + ] + }, + { + "@id": "_:N638499f1a35f4f94abab8a1e6e4bf97d", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-n3", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ { - "@language": "en", - "@value": "Something that acts as or causes Blackmail" + "@id": "https://www.w3.org/TeamSubmission/n3/" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://www.iana.org/assignments/media-types/text/n3" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "Blackmail" + "@value": "Risk Concepts - N3 serialiation" } - ] - }, - { - "@id": "_:N3ef9f5a9eb554279905f69c263712205", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk/risk.n3" } ], - "https://schema.org/url": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk#IdentificationControl", + "@id": "https://w3id.org/dpv/risk#MonitorRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk#RiskControl" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", @@ -17728,13 +17889,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#MonitorControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to identify characteristics of event" + "@value": "Control that monitors a Risk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -17745,42 +17906,30 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identification Control" + "@value": "Monitor Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#BruteForceAuthorisations", + "@id": "https://w3id.org/dpv/risk#AvailabilityIncident", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-05-19" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "_:Ned6a23a4f6894305bc5d07abc6872b8e" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17791,45 +17940,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques" + "@value": "Incident where the availability of information or system has been affected" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Brute Force Authorisations" - } - ] - }, - { - "@id": "_:Ned6a23a4f6894305bc5d07abc6872b8e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Availability Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#Discrimination", + "@id": "https://w3id.org/dpv/risk#Fraud", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -17837,13 +17970,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -17852,6 +17985,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N0328e4baf7504ceb93cd9bbab8b23099" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -17865,13 +18003,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Discrimination" + "@value": "Something that acts as or causes Fraud" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -17882,12 +18023,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Discrimination" + "@value": "Fraud" } ] }, { - "@id": "https://w3id.org/dpv/risk#PhishingScam", + "@id": "_:N0328e4baf7504ceb93cd9bbab8b23099", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ViolatingCodeOfConduct", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -17912,7 +18069,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N2039355de6a7474a8ab35355297e33c6" + "@id": "_:Nb240be91051241df8fe71581eedea8cc" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17923,18 +18080,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Phishing Scam" + "@value": "Something that acts as or causes Violation of Code of Conduct" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -17945,50 +18102,39 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Phishing Scam" + "@value": "Violating Code of Conduct" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0" } ] }, { - "@id": "_:N2039355de6a7474a8ab35355297e33c6", + "@id": "_:Nb240be91051241df8fe71581eedea8cc", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#Renumeration", + "@id": "https://w3id.org/dpv/risk#IntentionalMisuse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -18002,13 +18148,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides renumeration which is in monetary or financial form" + "@value": "Intentional Misuse" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -18019,206 +18165,224 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remuneration" + "@value": "Intentional Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk#IdentityTheft", + "@id": "https://w3id.org/dpv/risk", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "http://www.w3.org/2002/07/owl#Ontology", + "http://www.w3.org/ns/dx/prof/Profile" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/bibliographicCitation": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ + "@value": "http://www.w3.org/2000/01/rdf-schema" + }, { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "http://www.w3.org/2004/02/skos/core" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "_:Nad476399871e41a5bd37e1133df27770" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "@value": "Delaram Golpayegani" + }, { - "@id": "https://w3id.org/dpv/risk#" + "@value": "Fajar Ekaputra" + }, + { + "@value": "Rob Brennan" + }, + { + "@value": "Julio Fernandez" + }, + { + "@value": "Axel Polleres" + }, + { + "@value": "Beatriz Esteves" + }, + { + "@value": "Georg P. Krog" + }, + { + "@value": "Julian Flake" + }, + { + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/created": [ { "@language": "en", - "@value": "accepted" + "@value": "2022-08-14" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/dc/terms/creator": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "@language": "en", + "@value": "Harshvardhan J. Pandit" + }, { "@language": "en", - "@value": "Something that acts as or causes Identity Theft" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "@value": "Georg P. Krog" + }, { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@language": "en", + "@value": "Paul Ryan" + }, + { + "@language": "en", + "@value": "Rob Brennan" + }, + { + "@language": "en", + "@value": "Delaram Golpayegani" + }, + { + "@language": "en", + "@value": "Beatriz Esteves" + }, + { + "@language": "en", + "@value": "Julian Flake" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/description": [ { "@language": "en", - "@value": "Identity Theft" + "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" } - ] - }, - { - "@id": "_:Nad476399871e41a5bd37e1133df27770", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/identifier": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "https://w3id.org/dpv/risk" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/issued": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@language": "en", + "@value": "2022-08-14" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L6", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/license": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://www.w3.org/copyright/document-license-2023/" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/modified": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@language": "en", + "@value": "2024-07-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/publisher": [ { - "@value": "0.73,xsd:decimal" + "@id": "https://www.w3.org/" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://www.w3.org/groups/cg/dpvcg/" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/title": [ { "@language": "en", - "@value": "accepted" + "@value": "Risk Concepts" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/ontology/bibo/doi": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@value": "10.5281/zenodo.12505841" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/ontology/bibo/status": [ { - "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High" + "@value": "http://purl.org/ontology/bibo/status/published" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/vocab/vann/preferredNamespacePrefix": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@value": "risk" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/vocab/vann/preferredNamespaceUri": [ { - "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:6 L:6)" + "@value": "https://w3id.org/dpv/risk#" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#UnauthorisedReidentification", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#Label": [ { - "@value": "Georg P. Krog" + "@language": "en", + "@value": "RISK" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2002/07/owl#versionIRI": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@id": "https://w3id.org/dpv/2.1-dev/risk" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2002/07/owl#versionInfo": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2.1-dev" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/ns/dx/prof/hasResource": [ { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "@id": "https://w3id.org/dpv/primer" + }, { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "@id": "https://w3id.org/dpv/guides" + }, { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/examples" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-html" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-rdf" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-ttl" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-n3" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-jsonld" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/ns/dx/prof/isProfileOf": [ { - "@language": "en", - "@value": "Something that acts as or causes Unauthorised Re-Identification" + "@id": "http://www.w3.org/2000/01/rdf-schema#" + }, + { + "@id": "http://www.w3.org/2004/02/skos/core#" + }, + { + "@id": "https://w3id.org/dpv" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://xmlns.com/foaf/0.1/logo": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/media/logo.png" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/version": [ { - "@language": "en", - "@value": "Unauthorised Re-Identification" + "@value": "2.1-dev" } ] }, { - "@id": "https://w3id.org/dpv/risk#InterceptCommunications", + "@id": "https://w3id.org/dpv/risk#Benefit", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -18226,13 +18390,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-23" } ], "http://purl.org/dc/terms/modified": [ @@ -18241,11 +18405,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N9ba04625c759479eba79e0016163e8e6" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -18254,18 +18413,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Interception of Communications" + "@value": "Something that acts as or causes benefits" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -18276,38 +18435,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Intercept Communications" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N9ba04625c759479eba79e0016163e8e6", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Benefit" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseCredibility", + "@id": "https://w3id.org/dpv/risk#RM5x5S4L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -18320,15 +18457,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N347037135ba54cefae0a2a69a47e52d9" + "@value": "0.64,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18344,53 +18475,43 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Credibility" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Credibility" + "@value": "Very High Risk (RM5x5 S:4 L:4)" } ] }, { - "@id": "_:N347037135ba54cefae0a2a69a47e52d9", + "@id": "https://w3id.org/dpv/risk#incident-status-classes", "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } + "http://www.w3.org/2004/02/skos/core#ConceptScheme" ] }, { - "@id": "https://w3id.org/dpv/risk#VeryHighSeverity", + "@id": "https://w3id.org/dpv/risk#RightsLimitation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ @@ -18399,9 +18520,10 @@ "@value": "2022-08-18" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.9,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18417,62 +18539,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5SeverityLevels" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Very High" + "@value": "Something that acts as or causes Limitation of Rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Severity" + "@value": "Limitation of Rights" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" + "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S2L1", + "@id": "https://w3id.org/dpv/risk#IncidentSuspectedReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.08,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18483,33 +18596,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "A report describing the suspicion of an incident in the past or occuring" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:2 L:1)" + "@value": "Incident Suspected Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#VeryLowSeverity", + "@id": "https://w3id.org/dpv/risk#MonitorControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -18519,12 +18632,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.1,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18540,38 +18648,35 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5SeverityLevels" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Very Low" + "@value": "Risk Mitigation Measure that uses controls to monitor events" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Severity" + "@value": "Monitor Control" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" + "@value": "Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised." } ] }, { - "@id": "https://w3id.org/dpv/risk#Terrorism", + "@id": "https://w3id.org/dpv/risk#PhysicalAssault", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -18596,7 +18701,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nf6a25073f9274363bcb649fe8540fc70" + "@id": "_:N6b8cf1ee50ba4ea081a101b53baf3bb3" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18612,13 +18717,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Terrorism" + "@value": "Something that acts as or causes Physical Assault" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -18629,12 +18734,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Terrorism" + "@value": "Physical Assault" } ] }, { - "@id": "_:Nf6a25073f9274363bcb649fe8540fc70", + "@id": "_:N6b8cf1ee50ba4ea081a101b53baf3bb3", "@type": [ "https://schema.org/WebPage" ], @@ -18650,11 +18755,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#MonitorVulnerabilities", + "@id": "https://w3id.org/dpv/risk#7RiskLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -18664,7 +18769,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18680,33 +18785,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MonitorControl" + "@id": "https://w3id.org/dpv#RiskLevel" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Vulnerability" + "@value": "Scale with 7 Risk Levels from Extremely High to Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Vulnerabilities" + "@value": "7 Risk Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#LowLikelihood", + "@id": "https://w3id.org/dpv/risk#MaterialDamage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -18716,12 +18821,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-03-30" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.25,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18737,45 +18843,39 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Low" + "@value": "Something that acts as or causes Material Damage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Likelihood" + "@value": "Material Damage" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L4", + "@id": "https://w3id.org/dpv/risk#EquipmentFailure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -18788,9 +18888,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.33,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N8e86fbf714a04b25a51dfcacec1cb10e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18806,49 +18912,73 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High" + "@value": "Something that acts as or causes Equipment Failure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:4 L:4)" + "@value": "Equipment Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here equipment refers to physical equipment" } ] }, { - "@id": "https://w3id.org/dpv/risk#Payment", + "@id": "_:N8e86fbf714a04b25a51dfcacec1cb10e", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM5x5S2L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18864,54 +18994,39 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Payment" + "@value": "Moderate Risk (RM5x5 S:2 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentRegister", + "@id": "https://w3id.org/dpv/risk#SocietalRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv#RecordsOfActivities" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -18920,29 +19035,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RecordsOfActivities" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A register recording incidentes, their reports, notifications, and other related activities" + "@value": "Risks and issues that affect or have the potential to affect society at large or specific groups in society" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Register" + "@value": "Societal Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L3", + "@id": "https://w3id.org/dpv/risk#RM5x5S2L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -18961,7 +19076,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.18,xsd:decimal" + "@value": "0.32,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18977,13 +19092,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -18994,16 +19109,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:3 L:3)" + "@value": "Moderate Risk (RM5x5 S:2 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#VeryLowLikelihood", + "@id": "https://w3id.org/dpv/risk#ExtremelyHighSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -19018,7 +19133,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.1,xsd:decimal" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19034,16 +19149,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Very Low" + "@value": "Level where Severity is Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -19054,21 +19166,22 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Likelihood" + "@value": "Extremely High Severity" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" + "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentStatus", + "@id": "https://w3id.org/dpv/risk#MonitorVulnerabilities", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -19078,12 +19191,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples#E0069" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19091,11 +19199,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv#Status" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -19104,33 +19207,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Status" + "@id": "https://w3id.org/dpv/risk#MonitorControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Status associated with an incident" + "@value": "Control that monitors a Risk Vulnerability" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Status" + "@value": "Monitor Vulnerabilities" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExtremelyLowSeverity", + "@id": "https://w3id.org/dpv/risk#RemoveSource", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -19140,12 +19243,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.01,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19161,30 +19259,24 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" + "@id": "https://w3id.org/dpv/risk#SourceControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Extremely Low" + "@value": "Control that removes the risk source" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" + "@value": "Remove Source" } ] } diff --git a/2.1-dev/risk/risk.n3 b/2.1-dev/risk/risk.n3 index 2c375f60a..bf771fc79 100644 --- a/2.1-dev/risk/risk.n3 +++ b/2.1-dev/risk/risk.n3 @@ -156,7 +156,9 @@ risk:AuthorisationFailure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Authorisation Failure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Authorisation Failure"@en . @@ -166,7 +168,8 @@ risk:AvailabilityBreach a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:DataBreach ; + skos:broader risk:AvailabilityConcept, + risk:DataBreach ; skos:inScheme risk:risk-consequences-classes . risk:AvailabilityIncident a rdfs:Class, @@ -216,7 +219,8 @@ risk:Blackmail a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Blackmail"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Blackmail"@en . @@ -232,7 +236,9 @@ risk:BruteForceAuthorisations a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Brute Force Authorisations"@en . @@ -272,7 +278,8 @@ risk:Coercion a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Coercion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Coercion"@en . @@ -295,7 +302,8 @@ risk:ComponentFailure a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Component Failure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Component Failure"@en ; @@ -306,7 +314,8 @@ risk:ComponentMalfunction a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Component Malfunction"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Component Malfunction"@en ; @@ -323,7 +332,10 @@ risk:CompromiseAccount a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Compromise Account"@en . @@ -339,7 +351,8 @@ risk:CompromiseAccountCredentials a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:ConfidentialityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Compromise Account Credentials"@en . @@ -355,7 +368,8 @@ risk:ConfidentialityBreach a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:DataBreach ; + skos:broader risk:ConfidentialityConcept, + risk:DataBreach ; skos:definition "Something that acts as or causes Confidentiality Breach"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Confidentiality Breach"@en . @@ -432,7 +446,8 @@ risk:Cryptojacking a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Cryptojacking"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Cryptojacking"@en . @@ -463,7 +478,10 @@ risk:DataBreach a rdfs:Class, dex:E0071 ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SecurityBreach ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:SecurityBreach ; skos:definition "Something that acts as or causes Data Breach"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Data Breach"@en . @@ -479,7 +497,8 @@ risk:DataCorruption a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:IntegrityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Corruption of Data"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Data Corruption"@en ; @@ -503,14 +522,12 @@ risk:DenialServiceAttack a rdfs:Class, dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ], - [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Denial of Service Attack (DoS)"@en . @@ -563,7 +580,8 @@ risk:DistributedDenialServiceAttack a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en . @@ -600,7 +618,8 @@ risk:EquipmentFailure a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Equipment Failure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Equipment Failure"@en ; @@ -617,7 +636,8 @@ risk:EquipmentMalfunction a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Equipment Malfunction"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Equipment Malfunction"@en ; @@ -677,7 +697,8 @@ risk:Extorsion a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Extorsion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Extorsion"@en . @@ -817,7 +838,8 @@ risk:Fraud a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Fraud"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Fraud"@en . @@ -934,7 +956,8 @@ risk:IdentityFraud a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:ConfidentialityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Identity Fraud"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Identity Fraud"@en . @@ -950,7 +973,8 @@ risk:IdentityTheft a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:ConfidentialityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Identity Theft"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Identity Theft"@en . @@ -1294,7 +1318,8 @@ risk:IntegrityBreach a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:DataBreach ; + skos:broader risk:DataBreach, + risk:IntegrityConcept ; skos:inScheme risk:risk-consequences-classes . risk:IntegrityIncident a rdfs:Class, @@ -1329,22 +1354,13 @@ risk:InterceptCommunications a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Interception of Communications"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Intercept Communications"@en ; skos:scopeNote "This concept was called \"InterceptionCommunications\" in DPV 2.0"@en . -risk:InternalSecurityThreat a rdfs:Class, - skos:Concept, - dpv:RiskConcept ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader dpv:RiskConcept ; - skos:definition "Concepts associated with security threats and issues that originate within the organisation"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Internal Security Threat"@en . - risk:JudicialCosts a rdfs:Class, skos:Concept, dpv:RiskConcept ; @@ -1546,7 +1562,10 @@ risk:MaliciousCodeAttack a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Malicious Code Attack"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Malicious Code Attack"@en . @@ -1562,7 +1581,10 @@ risk:MalwareAttack a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Malware Attack"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Malware Attack"@en . @@ -1791,7 +1813,8 @@ risk:PhishingScam a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Phishing Scam"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Phishing Scam"@en . @@ -2995,7 +3018,8 @@ risk:Reidentification a rdfs:Class, dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:ConfidentialityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Re-identification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Re-identification"@en ; @@ -3268,7 +3292,9 @@ risk:Sabotage a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Sabotage"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Sabotage"@en . @@ -3284,7 +3310,8 @@ risk:Scam a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Scam"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Scam"@en . @@ -3294,7 +3321,10 @@ risk:SecurityAttack a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Security Attack"@en . @@ -3310,7 +3340,10 @@ risk:SecurityBreach a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Security Breach"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Security Breach"@en . @@ -3401,7 +3434,9 @@ risk:Spoofing a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat, + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept, risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Spoofing"@en ; skos:inScheme risk:risk-consequences-classes ; @@ -3418,7 +3453,8 @@ risk:SystemFailure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes System Failure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "System Failure"@en ; @@ -3435,7 +3471,10 @@ risk:SystemIntrusion a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes System Intrusion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "System Intrusion"@en . @@ -3451,7 +3490,8 @@ risk:SystemMalfunction a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes System Malfunction"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "System Malfunction"@en ; @@ -3505,7 +3545,10 @@ risk:UnauthorisedAccesstoPremises a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Access to Premises"@en . @@ -3515,7 +3558,10 @@ risk:UnauthorisedActivity a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised Activity"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Activity"@en . @@ -3531,7 +3577,9 @@ risk:UnauthorisedCodeAccess a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised Code Access"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Code Access"@en . @@ -3547,7 +3595,8 @@ risk:UnauthorisedCodeDisclosure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Code Disclosure"@en . @@ -3563,7 +3612,8 @@ risk:UnauthorisedCodeModification a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Code Modification"@en . @@ -3579,7 +3629,8 @@ risk:UnauthorisedDataAccess a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Data Access"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Data Access"@en . @@ -3595,7 +3646,8 @@ risk:UnauthorisedDataDisclosure a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Data Disclosure"@en . @@ -3611,7 +3663,8 @@ risk:UnauthorisedDataModification a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Data Modification"@en . @@ -3627,7 +3680,8 @@ risk:UnauthorisedInformationDisclosure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Information Disclosure"@en . @@ -3640,7 +3694,8 @@ risk:UnauthorisedReidentification a rdfs:Class, dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Re-Identification"@en . @@ -3656,7 +3711,8 @@ risk:UnauthorisedResourceUse a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Resource Use"@en . @@ -3672,7 +3728,9 @@ risk:UnauthorisedSystemAccess a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised System Access"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised System Access"@en . @@ -3688,7 +3746,8 @@ risk:UnauthorisedSystemModification a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised System Modification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised System Modification"@en . @@ -3704,7 +3763,9 @@ risk:UnwantedCodeDeletion a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unwanted Code Deletion"@en . @@ -3720,7 +3781,9 @@ risk:UnwantedDataDeletion a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unwanted Data Deletion"@en . @@ -3736,7 +3799,8 @@ risk:UnwantedDisclosureData a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unwanted Disclosure of Data"@en . @@ -3963,22 +4027,6 @@ risk:Vulnerability a rdfs:Class, skos:inScheme risk:core-classes ; skos:prefLabel "Vulnerability"@en . -risk:VulnerabilityCreated a rdfs:Class, - skos:Concept, - dpv:RiskConcept ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:modified "2024-08-16"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:InternalSecurityThreat ; - skos:definition "Something that acts as or causes Vulnerability Created"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Vulnerability Created"@en . - a owl:Ontology, profile:Profile ; dct:bibliographicCitation "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" ; diff --git a/2.1-dev/risk/risk.rdf b/2.1-dev/risk/risk.rdf index 484e39a72..a6fe7a9a7 100644 --- a/2.1-dev/risk/risk.rdf +++ b/2.1-dev/risk/risk.rdf @@ -13,158 +13,178 @@ xmlns:sw="http://www.w3.org/2003/06/sw-vocab-status/ns#" xmlns:vann="http://purl.org/vocab/vann/" > - + - - Physical Assault - Something that acts as or causes Physical Assault - - + + Extremely Low Severity + Level where Severity is Extremely Low + + 0.01,xsd:decimal + The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 + 2022-08-18 + accepted + Harshvardhan J. Pandit + + + + + + + + Very Low Risk (RM7x7 S:1 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low + + 0.10,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Environmental Incident - Incident caused due to environmental factors outside human controls - - + + Share Risk + Risk Mitigation Measure that shares Risk e.g. amongst stakeholders + 2024-05-19 accepted + Harshvardhan J. Pandit - + - + - - Risk Matrix 7x7 - A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types - + + Blackmail + Something that acts as or causes Blackmail + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - has risk source - Indicates the risk (subject) has the indicated risk source (object) - - - - + refers to risk + Indicates the incident (subject) is a materialisation of the indicated risk (object) + + + + 2024-02-14 accepted + - + - Lose of Negotiating Capacity - Something that acts as or causes Loss of Negotiating Capacity - - + Violation of Contractual Obligation + Something that acts as or causes Violation of Contractual Obligations + + This concept was called "ViolationContractualObligations" in DPV 2.0 + 2022-08-17 2024-08-16 - accepted + modified Harshvardhan J. Pandit - + - Remuneration - Something that acts as or provides renumeration which is in monetary or financial form + Fee + Something that acts as or provides fees e.g. for using a service + DGA 2.10 2024-04-14 2024-08-16 - accepted + modified Georg P. Krog, Harshvardhan J. Pandit - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - + - Moderate Risk (RM7x7 S:5 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate + Very High Risk (RM7x7 S:5 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High - 0.31,xsd:decimal + 0.51,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Social Disadvantage - Something that acts as or causes Social Disadvantage - - 2022-08-19 - 2024-08-16 + + Moderate Risk + Level where Risk is Moderate + + + + 0.5,xsd:decimal + The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 + 2022-08-18 accepted - Georg P. Krog + Harshvardhan J. Pandit - + - + - - Very High Risk (RM5x5 S:4 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High - - 0.80,xsd:decimal - 2022-08-17 + + Extremely Low Risk + Level where Risk is Extremely Low + + 0.01,xsd:decimal + The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - - Very High Risk (RM5x5 S:4 L:4) - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High - - 0.64,xsd:decimal - 2022-08-17 + + Component Malfunction + Something that acts as or causes Component Malfunction + + + Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of accepted - Harshvardhan J. Pandit - + - + - Phishing Scam - Something that acts as or causes Phishing Scam + Cryptojacking + Something that acts as or causes Cryptojacking + - + 2022-08-17 2024-08-16 accepted @@ -172,413 +192,369 @@ - + - - Extremely High Risk (RM7x7 S:7 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High - - 0.71,xsd:decimal + + Distributed Denial of Service Attack (DDoS) + Something that acts as or causes Distributed Denial of Service Attack (DDoS) + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Very Low Severity - Level where Severity is Very Low - - - 0.1,xsd:decimal - The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 - 2022-08-18 + + Unauthorised Access to Premises + Something that acts as or causes Unauthorised Access to Premises + + + + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Incident Ongoing - The incident is ongoing i.e. still active - - 2024-02-14 + + Extremely High Risk (RM7x7 S:6 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High + + 0.86,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - - - - - - Deliberate Incident - Incident caused due to deliberate actions of a human - - - 2024-05-19 - accepted - - + - + - Moderate Risk (RM3x3 S:2 L:2) - Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate - - 0.44,xsd:decimal + Very Low Risk (RM5x5 S:1 L:1) + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low + + 0.04,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Extremely Low Risk (RM7x7 S:2 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low + Very Low Risk (RM7x7 S:1 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low - 0.04,xsd:decimal + 0.08,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - - - - - Risk Concepts - HTML serialiation - - - - - has vulnerability - Indicates the associated context (subject) has indicated vulnerability (object) - - - 2024-02-14 - accepted - - - - - - - - Avoid Source - Control that avoids the risk source - - 2024-05-19 - accepted - Harshvardhan J. Pandit - - - - + - Personal Safety Endangerment - Something that acts as or causes Personal Safety Endangerment - - + Data Corruption + Something that acts as or causes Corruption of Data + + + This concept was called "Corruption Data" in DPV 2.0 + 2022-08-17 2024-08-16 - accepted + modified Harshvardhan J. Pandit - + - Fraud - Something that acts as or causes Fraud - - - 2022-08-17 + Discrimination + Something that acts as or causes Discrimination + + 2022-08-19 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog - - - IEC 31010:2019 - https://www.iso.org/standard/72140.html - - + + - - - Very High Risk - Level where Risk is Very High - - - 0.9,xsd:decimal - The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 - 2022-08-18 + caused by threat + Indicates the cause of associated context (subject) was the indicated threat (object) + + + 2024-02-14 accepted - Harshvardhan J. Pandit - - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + - + - High Risk (RM3x3 S:3 L:2) - Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High - - 0.67,xsd:decimal + Low Risk (RM5x5 S:1 L:4) + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low + + 0.16,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Sexual Violence - Something that acts as or causes Sexual Violence - - + + Extremely High Risk (RM7x7 S:5 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High + + 0.71,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Low Likelihood - Level where Likelihood is Low - - - - 0.25,xsd:decimal - The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 - 2022-08-18 + + Very High Risk (RM5x5 S:5 L:4) + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High + + 0.80,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + - Incident Preliminary Report - A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known - - - 2024-05-19 + + Operational Security Risk + Risks and issues that arise during operational processes + accepted - + - + - - Incident Mitigated - The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring - - 2024-02-14 + + Financial Impact + Things that cause or have the potential to impact financial resources + accepted - Harshvardhan J. Pandit - + - + - - Risk Matrix - Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other. - - - 2024-02-14 + + High Risk (RM7x7 S:3 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High + + 0.31,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + - - 3 Severity Levels - Scale with 3 Severity Levels from High to Low - + Risk Analysis + A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures + + + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - - Copyright Violation - Something that acts as or causes Copyright Violation - - + + High Risk (RM5x5 S:3 L:4) + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High + + 0.48,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - 3 Likelihood Levels - Scale with 3 Likelihood Levels from High to Low - - 2022-08-18 + + High Risk (RM7x7 S:4 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High + + 0.33,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + - - Recovery Control - Control to recover from event - - 2024-05-19 + + Moderate Risk (RM7x7 S:6 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate + + 0.24,xsd:decimal + 2022-08-17 accepted + Harshvardhan J. Pandit - - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + - + - Detriment - Something that acts as or causes Detriment - - 2022-03-23 + System Failure + Something that acts as or causes System Failure + + + Here system refers to both hardware and software systems + + 2022-08-17 2024-08-16 accepted - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves + Harshvardhan J. Pandit - + - - Societal Health & Safety - + + Moderate Severity + Level where Severity is Moderate + + + + 0.5,xsd:decimal + The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 + 2022-08-18 accepted + Harshvardhan J. Pandit - + - + - Very High Risk (RM7x7 S:6 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High - - 0.61,xsd:decimal + Risk Matrix 5x5 + A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types + 2022-08-17 accepted Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - - High Risk (RM5x5 S:5 L:2) - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High - - 0.40,xsd:decimal - 2022-08-17 + + Remove Consequence + Control that removes Consequence i.e. prevents it from materialising + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + - - Low Risk (RM7x7 S:3 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - - 0.18,xsd:decimal + + Sabotage + Something that acts as or causes Sabotage + + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Source Control - Risk Mitigation Measure that controls the Source - - 2024-05-19 + + Privacy + + accepted + + + + + + + + Low Risk (RM7x7 S:5 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low + + 0.20,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + - Cryptojacking - Something that acts as or causes Cryptojacking + Unauthorised Code Disclosure + Something that acts as or causes Unauthorised Code Disclosure + - + 2022-08-17 2024-08-16 accepted @@ -586,14 +562,15 @@ - + - Lose of Goodwill - Something that acts as or causes Loss of Goodwill - - + Violence against children + Something that acts as or causes Child Violence + + This concept was called "ChildViolence" in DPV 2.0 + 2022-08-17 2024-08-16 accepted @@ -601,12 +578,12 @@ - + - Low Risk (RM7x7 S:5 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low + Low Risk (RM7x7 S:2 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low 0.20,xsd:decimal 2022-08-17 @@ -615,28 +592,31 @@ - + - Low Risk (RM7x7 S:7 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low + Extremely Low Risk (RM7x7 S:1 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low - 0.14,xsd:decimal + 0.06,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Lose of Opportunity - Something that acts as or causes Loss of Opportunity - - + System Intrusion + Something that acts as or causes System Intrusion + + + + + 2022-08-17 2024-08-16 accepted @@ -644,56 +624,49 @@ - + - Component Malfunction - Something that acts as or causes Component Malfunction + Identity Fraud + Something that acts as or causes Identity Fraud + - Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of - accepted - - - - - - - - Unauthorised Activity - Something that acts as or causes Unauthorised Activity - + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - Moderate Risk (RM7x7 S:3 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate - - 0.24,xsd:decimal + Low Risk (RM3x3 S:2 L:1) + Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low + + 0.22,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Extremely Low Risk (RM7x7 S:1 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - - 0.02,xsd:decimal - 2022-08-17 + + Monitor Control + Risk Mitigation Measure that uses controls to monitor events + + Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised. + 2024-05-19 accepted Harshvardhan J. Pandit - + @@ -701,8 +674,9 @@ Unwanted Disclosure of Data Something that acts as or causes Unwanted Disclosure of Data + - + 2022-08-17 2024-08-16 accepted @@ -710,173 +684,211 @@ - + - Risk Matrix 5x5 - A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types - + Moderate Risk (RM7x7 S:3 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate + + 0.24,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Lose of Reputation - Something that acts as or causes Loss of Reputation - - + + Low Risk (RM7x7 S:3 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low + + 0.18,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - + - + + + + + + Risk Concepts + http://purl.org/ontology/bibo/status/published + RISK + Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management + 2022-08-14 + 2022-08-14 + 2024-07-13 + Harshvardhan J. Pandit + Georg P. Krog + Paul Ryan + Rob Brennan + Delaram Golpayegani + Beatriz Esteves + Julian Flake + 2.1-dev + 2.1-dev + https://w3id.org/dpv/risk + http://www.w3.org/2000/01/rdf-schema + http://www.w3.org/2004/02/skos/core + 10.5281/zenodo.12505841 + Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 + + + Delaram Golpayegani + Fajar Ekaputra + Rob Brennan + Julio Fernandez + Axel Polleres + Beatriz Esteves + Georg P. Krog + Julian Flake + Harshvardhan J. Pandit + + risk + https://w3id.org/dpv/risk# + + + + + + + + + + + + + - Payment - Something that acts as or provides payment e.g. to access a service or purchase resources - - 2024-04-14 + Unauthorised Data Access + Something that acts as or causes Unauthorised Data Access + + + + 2022-08-17 2024-08-16 accepted - Georg P. Krog, Harshvardhan J. Pandit + Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - - Data Breach - Something that acts as or causes Data Breach - - - 2022-08-17 - 2024-08-16 + Vulnerability + Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk + + 2024-02-14 accepted - Harshvardhan J. Pandit - - - + - + - Moderate Risk (RM7x7 S:7 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate + Extremely Low Risk (RM7x7 S:2 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low - 0.29,xsd:decimal + 0.08,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - - - - - Risk Concepts - Turtle serialiation - - + - - Extremely High Risk (RM7x7 S:5 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High - - 0.71,xsd:decimal - 2022-08-17 + Incident + An actual or occured event + + + + Incident is realised or materialised risk + 2024-02-14 + 2024-05-19 + 2024-08-16 accepted - Harshvardhan J. Pandit + Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez + + - + + - + - IEC 31010:2019 - https://www.iso.org/standard/72140.html + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - - Moderate Risk (RM7x7 S:4 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate - - 0.24,xsd:decimal + + Intercept Communications + Something that acts as or causes Interception of Communications + + + This concept was called "InterceptionCommunications" in DPV 2.0 + 2022-08-17 - accepted + 2024-08-16 + modified Harshvardhan J. Pandit - + - + - - 7 Likelihood Levels - Scale with 7 Likelihood Levels from Extremely High to Extremely Low - - 2022-08-18 + + Harm + Something that acts as or causes Harm to humans + + This concept refers to the general abstract notion of harm + 2022-08-13 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Extremely High Risk (RM7x7 S:7 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High - - 0.86,xsd:decimal + Moderate Risk (RM3x3 S:1 L:3) + Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate + + 0.33,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - - - Impact Control - Risk Mitigation Measure that controls Impacts - - 2024-05-19 - accepted - Harshvardhan J. Pandit - - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - Unauthorised Code Access - Something that acts as or causes Unauthorised Code Access - - + Financial Loss + Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity + + 2022-08-17 2024-08-16 accepted @@ -884,276 +896,215 @@ - + - - High Risk (RM7x7 S:4 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High - - 0.33,xsd:decimal - 2022-08-17 + + Intentional Misuse + Intentional Misuse + accepted - Harshvardhan J. Pandit - + - + - - Moderate Risk (RM5x5 S:2 L:4) - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate - - 0.32,xsd:decimal + + Extorsion + Something that acts as or causes Extorsion + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Violating Code of Conduct - Something that acts as or causes Violation of Code of Conduct - - This concept was called "ViolationCodeConduct" in DPV 2.0 - + Lose of Trust + Something that acts as or causes Loss of Trust + + 2022-08-17 2024-08-16 - modified + accepted Harshvardhan J. Pandit - + - Human Errors - Something that acts as or causes Human Errors - - + Violating Ethics Code + Something that acts as or causes Violation of Ethics Code + + This concept was called "ViolationEthicalCode" in DPV 2.0 + 2022-08-17 2024-08-16 - accepted + modified Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - - Moderate Risk - Level where Risk is Moderate - - - - 0.5,xsd:decimal - The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 - 2022-08-18 + + Identification Control + Control to identify characteristics of event + + 2024-05-19 accepted - Harshvardhan J. Pandit - + - + - - Very High Risk (RM7x7 S:6 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High - - 0.49,xsd:decimal + + Unauthorised Data Disclosure + Something that acts as or causes Unauthorised Data Disclosure + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + + + ENISa Trust Services Security Incidents 2021 + https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 + + - Intercept Communications - Something that acts as or causes Interception of Communications - - This concept was called "InterceptionCommunications" in DPV 2.0 - + Compromise Account Credentials + Something that acts as or causes Account Credentials to be compromised + + + 2022-08-17 2024-08-16 - modified + accepted Harshvardhan J. Pandit - + + + + Risk Assessment + Assessment of risk involving its identification, analysis, and evaluation + + + ISO 31073:2022 Risk management vocabulary + 2024-02-14 + accepted + + + + - Public Order Breach - Something that acts as or causes Public Order Breach + Detriment + Something that acts as or causes Detriment - - 2022-08-17 + 2022-03-23 2024-08-16 accepted - Harshvardhan J. Pandit + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves - + - Financial Impact - Things that cause or have the potential to impact financial resources - + Psychological Harm + Something that acts as or causes Psychological Harm + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - Low Risk (RM5x5 S:5 L:1) - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low + Moderate Risk (RM5x5 S:2 L:3) + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate - 0.20,xsd:decimal + 0.24,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Violation of Contractual Obligation - Something that acts as or causes Violation of Contractual Obligations + Copyright Violation + Something that acts as or causes Copyright Violation - This concept was called "ViolationContractualObligations" in DPV 2.0 - + 2022-08-17 2024-08-16 - modified + accepted Harshvardhan J. Pandit - - - - - Security Breach - Something that acts as or causes Security Breach - - - 2022-08-17 - 2024-08-16 - accepted - Harshvardhan J. Pandit - - - - - - - - Very Low Risk (RM7x7 S:1 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low - - 0.10,xsd:decimal - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Confidentiality Breach - Something that acts as or causes Confidentiality Breach - - - 2022-08-17 - 2024-08-16 - accepted - Harshvardhan J. Pandit - - - - - - - - Risk Matrix 3x3 - A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types - - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - Incident Assessment Report - A report describing the assessment of an incident in terms of its effects or impacts - - - 2024-05-19 - accepted - - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - Incident Mitigation Measure - A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again - - + Incident Impact Assessment + An impact assessment associated with a incident + + 2024-05-19 accepted + Harshvardhan J. Pandit - - - - - Reputational Risk - Risks and issues that affect the reputation of the organisation - - accepted - - - - + + - - Incident Report - Documented information about an incident, its handling, assessments,and notifications - - - 2024-05-19 + has risk source + Indicates the risk (subject) has the indicated risk source (object) + + + + + 2024-02-14 accepted - + @@ -1172,71 +1123,59 @@ - + - - 5 Likelihood Levels - Scale with 5 Likelihood Levels from Very High to Very Low - - 2022-08-18 + + Unauthorised Data Modification + Something that acts as or causes Unauthorised Data Modification + + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - + - - Low Risk (RM7x7 S:4 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low - - 0.16,xsd:decimal + + Exposure to Harmful Speech + Something that acts as or causes Harmful Speech + + This concept was called "HarmfulSpeech" in DPV 2.0 + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Damage - Something that acts as or causes Damage - - 2022-03-30 + Fraud + Something that acts as or causes Fraud + + + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - - - - is exploited by - Indicates the vulnerability (subject) is exploited by the indicated threat (object) - - - - - 2024-02-14 - accepted - - - - + - Confidentiality Incident - Incident where the confidentiality of information or system has been affected + Deliberate Incident + Incident caused due to deliberate actions of a human 2024-05-19 @@ -1244,49 +1183,44 @@ - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + + - - - Incident Near Miss - The state where an incident was almost successful in taking place i.e. "it came very close" - + has threat source + Indicates the threat (subject) has the indicated source (object) + + + + 2024-02-14 accepted - Harshvardhan J. Pandit - + - + - - Moderate Severity - Level where Severity is Moderate - - - - 0.5,xsd:decimal - The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 - 2022-08-18 + + Extremely High Risk (RM7x7 S:7 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High + + 0.71,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + - Unauthorised Data Disclosure - Something that acts as or causes Unauthorised Data Disclosure + Unwanted Data Deletion + Something that acts as or causes Unwanted Data Deletion + + - + 2022-08-17 2024-08-16 accepted @@ -1294,99 +1228,65 @@ - - - - - Monitor Control - Control that monitors another Control - - 2024-05-19 - accepted - Harshvardhan J. Pandit - - - - + - Financial Loss - Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity - - - 2022-08-17 + Non-Material Damage + Something that acts as or causes Non-Material Damage + + The criteria for what is considered material damage is based in jurisdictional laws and norms + 2022-03-30 2024-08-16 accepted Harshvardhan J. Pandit - + - - Moderate Risk (RM7x7 S:2 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate - - 0.29,xsd:decimal - 2022-08-17 + Risk Control + Control that modifies risk + + + 2024-05-19 accepted - Harshvardhan J. Pandit + - - - - - - - Erroneous System Use - Something that acts as or causes Erroneous System Use - - - 2022-08-17 - 2024-08-16 - accepted - Harshvardhan J. Pandit - - + - + - Incident Status - Status associated with an incident - - - 2024-02-14 + Incident Report + Documented information about an incident, its handling, assessments,and notifications + + + 2024-05-19 accepted - Harshvardhan J. Pandit - - - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + - + - - Change Impact - Control that changes Impact - - 2024-05-19 + + Public Order Breach + Something that acts as or causes Public Order Breach + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html @@ -1401,137 +1301,131 @@ - + + - - - Violation of Legal Obligations - Something that acts as or causes Violation of Legal Obligations - - This concept was called "ViolationRegulatoryObligations" in DPV 2.0 - - 2022-08-17 - 2024-08-16 - modified - Harshvardhan J. Pandit + caused by vulnerability + Indicates the associated context (subject) is caused by the indicated vulnerability (object) + + + 2024-02-14 + accepted - + - + - - Remove Source - Control that removes the risk source - - 2024-05-19 + + 3 Severity Levels + Scale with 3 Severity Levels from High to Low + + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - - Identification Control - Control to identify characteristics of event - - 2024-05-19 + + High Risk (RM7x7 S:6 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High + + 0.37,xsd:decimal + 2022-08-17 accepted + Harshvardhan J. Pandit - + - + - - Malware Attack - Something that acts as or causes Malware Attack - - + + Very High Risk (RM5x5 S:4 L:4) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High + + 0.64,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Low Risk (RM5x5 S:2 L:2) - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - - 0.16,xsd:decimal + + Denial of Service Attack (DoS) + Something that acts as or causes Denial of Service Attack (DoS) + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - - - - - - - Examples for Data Privacy Vocabulary - - + - + - - Reduce Severity - Control that reduces the severity of an event - - 2024-05-19 + + Compromise Account + Something that acts as or causes a compromised account that is then used by the compromiser + + + + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Threat - Risk source event which causes Risk - - + + Incident Ongoing + The incident is ongoing i.e. still active + 2024-02-14 accepted + Harshvardhan J. Pandit - + - + - - Very High Likelihood - Level where Likelihood is Very High - - - 0.9,xsd:decimal - The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 - 2022-08-18 + + High Risk (RM3x3 S:2 L:3) + Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High + + 0.67,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + - Risk Control - Control that modifies risk - - + Availability Incident + Incident where the availability of information or system has been affected + + 2024-05-19 accepted - - + @@ -1539,8 +1433,11 @@ Malicious Code Attack Something that acts as or causes Malicious Code Attack + + + - + 2022-08-17 2024-08-16 accepted @@ -1548,29 +1445,33 @@ - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - - Injury - Something that acts as or causes Injury - - - 2022-08-17 - 2024-08-16 + Incident Detection Report + A report describing the detection of a Incident + + + 2024-05-19 accepted - Harshvardhan J. Pandit - + - + - Authorisation Failure - Something that acts as or causes Authorisation Failure - - + Unwanted Code Deletion + Something that acts as or causes Unwanted Code Deletion + + + + 2022-08-17 2024-08-16 accepted @@ -1578,139 +1479,174 @@ - + - Extremely Low Risk (RM7x7 S:1 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low - - 0.04,xsd:decimal + High Risk (RM5x5 S:4 L:3) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + + 0.48,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - High Risk (RM5x5 S:2 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High - - 0.40,xsd:decimal - 2022-08-17 + + Re-identification + Something that acts as or causes Re-identification + + + Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification + 2022-08-19 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - - - - - Risk Concepts - http://purl.org/ontology/bibo/status/published - RISK - Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management - 2022-08-14 - 2022-08-14 - 2024-07-13 - Harshvardhan J. Pandit - Georg P. Krog - Paul Ryan - Rob Brennan - Delaram Golpayegani - Beatriz Esteves - Julian Flake - 2.1-dev - 2.1-dev - https://w3id.org/dpv/risk - http://www.w3.org/2000/01/rdf-schema - http://www.w3.org/2004/02/skos/core - 10.5281/zenodo.12505841 - Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 - - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + + Incident Concluded + The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring + + 2024-02-14 + accepted Harshvardhan J. Pandit - Georg P. Krog - Rob Brennan - Beatriz Esteves - Axel Polleres - Fajar Ekaputra - Delaram Golpayegani - Julian Flake - Julio Fernandez - - risk - https://w3id.org/dpv/risk# - - - - - - - - - - - + + - + - Prevent Exercising of Rights - Something that acts as or causes Prevent Exercising of Rights - - This concept was called "PreventExercisingOfRights" in DPV 2.0 - 2022-08-18 + Violation of Statutory Obligations + Something that acts as or causes Violation of Statutory Obligations + + This concept was called "ViolationStatutoryObligations" in DPV 2.0 + + 2022-08-17 2024-08-16 + modified + Harshvardhan J. Pandit + + + + + + + + Moderate Risk (RM5x5 S:3 L:2) + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate + + 0.24,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + + + + + + + Judicial Costs + Something that involves or causes judicial costs to be paid + accepted - Georg P. Krog, Harshvardhan J. Pandit - + + + + + Incident Suspected + The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing + + 2024-02-14 + accepted + Harshvardhan J. Pandit + + + + + + + + Extremely High Severity + Level where Severity is Extremely High + + 0.99,xsd:decimal + The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 + 2022-08-18 + accepted + Harshvardhan J. Pandit + + + + - Low Risk (RM3x3 S:2 L:1) - Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low - - 0.22,xsd:decimal + Very High Risk (RM7x7 S:7 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High + + 0.57,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - User Risks - Concepts associated with risks that arise due to User or Human use - + Component Failure + Something that acts as or causes Component Failure + + + Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of accepted - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + + High Risk (RM7x7 S:3 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High + + 0.37,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + - + - Extorsion - Something that acts as or causes Extorsion + Brute Force Authorisations + Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques + + - + 2022-08-17 2024-08-16 accepted @@ -1718,65 +1654,133 @@ - + + + + Incident Suspected Report + A report describing the suspicion of an incident in the past or occuring + + + 2024-05-19 + accepted + + + + + + + + Extremely High Risk (RM7x7 S:5 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High + + 0.61,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + + + + + + + Incident Mitigated + The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring + + 2024-02-14 + accepted + Harshvardhan J. Pandit + + + + - Violation of Statutory Obligations - Something that acts as or causes Violation of Statutory Obligations - - This concept was called "ViolationStatutoryObligations" in DPV 2.0 - + Lose of Negotiating Capacity + Something that acts as or causes Loss of Negotiating Capacity + + 2022-08-17 2024-08-16 - modified + accepted Harshvardhan J. Pandit - + + + + + Equipment Malfunction + Something that acts as or causes Equipment Malfunction + + + Here equipment refers to physical equipment + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + + + - Containment Control - Control to contain event - + Remove Source + Control that removes the risk source + 2024-05-19 accepted + Harshvardhan J. Pandit - - + + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - has control - Indicates the use of specified control - - + + + Risk Matrix + Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other. + + 2024-02-14 accepted + Harshvardhan J. Pandit - + - + - Threat Source - Source of threat event, including both agent and non-agent sources - - 2024-02-14 + Accidental Incident + Incident caused due to accidental actions arising from human or human-controlled situations + + + 2024-05-19 accepted - + - + - Distributed Denial of Service Attack (DDoS) - Something that acts as or causes Distributed Denial of Service Attack (DDoS) - - + Illegal Data Processing + Something that acts as or causes Illegal Processing of Data + + This concept was called "IllegalProcessingData" in DPV 2.0 + 2022-08-17 2024-08-16 accepted @@ -1784,18 +1788,20 @@ - - - - - Monitor Risk - Control that monitors a Risk - - 2024-05-19 + + + + + Lose of Customer Confidence + Something that acts as or causes Loss of Customer Confidence + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + @@ -1810,104 +1816,89 @@ - + - Lose of Credibility - Something that acts as or causes Loss of Credibility - - + Violating Code of Conduct + Something that acts as or causes Violation of Code of Conduct + + This concept was called "ViolationCodeConduct" in DPV 2.0 + 2022-08-17 2024-08-16 - accepted + modified Harshvardhan J. Pandit - - - - Incident Notice - Notice associated with an Incident - - - 2024-05-19 - accepted - - - - + - - Extremely High Likelihood - Level where Likelihood is Extremely High - - 0.99,xsd:decimal - The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 - 2022-08-18 + + Data Breach + Something that acts as or causes Data Breach + + + + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit + + - + - + - - Change Consequence - Control that changes Consequence - - 2024-05-19 + + Societal Health & Safety + accepted - Harshvardhan J. Pandit - + - + - - Low Risk (RM3x3 S:1 L:2) - Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low - - 0.22,xsd:decimal - 2022-08-17 + + Judicial Penalty + Something that involves or causes judicial penalties to be paid + accepted - Harshvardhan J. Pandit - + - + - - Very Low Risk (RM5x5 S:1 L:2) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low - - 0.08,xsd:decimal + + Unauthorised Code Access + Something that acts as or causes Unauthorised Code Access + + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - - - - - ENISA Threat Landscape 2021 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 + - + - Spoofing - Something that acts as or causes Spoofing + Phishing Scam + Something that acts as or causes Phishing Scam + - - - + 2022-08-17 2024-08-16 accepted @@ -1915,205 +1906,118 @@ - + - High Risk (RM7x7 S:3 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High + Extremely High Risk (RM7x7 S:6 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High - 0.31,xsd:decimal + 0.73,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Low Risk (RM7x7 S:2 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low - - 0.20,xsd:decimal + Low Risk (RM3x3 S:1 L:2) + Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low + + 0.22,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - - Availability Incident - Incident where the availability of information or system has been affected - - - 2024-05-19 - accepted - - - - - - - Incident Concluding Report - A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known - - - 2024-05-19 - accepted - - - - - - - - Detection Control - Control to detect event - - 2024-05-19 - accepted - - - - + - - Lose of Customer Confidence - Something that acts as or causes Loss of Customer Confidence - - + + High Risk (RM7x7 S:7 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High + + 0.43,xsd:decimal 2022-08-17 - 2024-08-16 - accepted - Harshvardhan J. Pandit - - - - - - - - Incident Terminated - The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring - - 2024-02-14 accepted Harshvardhan J. Pandit - + - + - High Risk (RM7x7 S:3 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High + Extremely Low Risk (RM7x7 S:2 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - 0.37,xsd:decimal + 0.04,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Psychological Harm - Something that acts as or causes Psychological Harm - - - 2022-08-17 - 2024-08-16 + + Monitor Risk Source + Control that monitors a Risk Source + + 2024-05-19 accepted Harshvardhan J. Pandit - - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + - + - Risk Analysis - A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures - - - + + Very High Risk + Level where Risk is Very High + + + 0.9,xsd:decimal + The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 2022-08-18 accepted Harshvardhan J. Pandit - - - - - - - Very High Risk (RM7x7 S:4 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High - - 0.49,xsd:decimal - 2022-08-17 - accepted - Harshvardhan J. Pandit - - + - + - - Very Low Risk (RM7x7 S:5 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low - - 0.10,xsd:decimal - 2022-08-17 + + 5 Likelihood Levels + Scale with 5 Likelihood Levels from Very High to Very Low + + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - Moderate Risk (RM7x7 S:6 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate + Extremely Low Risk (RM7x7 S:4 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low - 0.24,xsd:decimal + 0.08,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - - - High Likelihood - Level where Likelihood is High - - - - 0.75,xsd:decimal - The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 - 2022-08-18 - accepted - Harshvardhan J. Pandit - - - @@ -2128,85 +2032,99 @@ - + - - High Risk (RM5x5 S:3 L:4) - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - - 0.48,xsd:decimal + + Impact to Rights + Something that acts as or causes Impact to Rights + + + This concept was called "ImpactToRights" in DPV 2.0 + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - High Risk (RM3x3 S:2 L:3) - Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - - 0.67,xsd:decimal + + Scam + Something that acts as or causes Scam + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Violating Policy - Something that acts as or causes violation of policy which can be either internal or external policy - + System Malfunction + Something that acts as or causes System Malfunction + + + Here system refers to both hardware and software systems + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - - - Guides for Data Privacy Vocabulary - - + + + + + Risk Concepts - N3 serialiation - + - - Very Low Risk (RM7x7 S:1 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low - - 0.12,xsd:decimal - 2022-08-17 + + Social Disadvantage + Something that acts as or causes Social Disadvantage + + 2022-08-19 + 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog - + - + - - Privacy - + Environmental Incident + Incident caused due to environmental factors outside human controls + + + 2024-05-19 accepted - + - + - Vulnerability Created - Something that acts as or causes Vulnerability Created - - + Identity Theft + Something that acts as or causes Identity Theft + + + 2022-08-17 2024-08-16 accepted @@ -2214,63 +2132,111 @@ - + - Accidental Incident - Incident caused due to accidental actions arising from human or human-controlled situations - - - 2024-05-19 + Incident Status + Status associated with an incident + + + 2024-02-14 + accepted + Harshvardhan J. Pandit + + + + + + + + + Payment + Something that acts as or provides payment e.g. to access a service or purchase resources + + 2024-04-14 + 2024-08-16 accepted + Georg P. Krog, Harshvardhan J. Pandit - + - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - + Lose of Credibility + Something that acts as or causes Loss of Credibility + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - Very High Risk (RM7x7 S:5 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High + Very Low Risk (RM7x7 S:2 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low - 0.51,xsd:decimal + 0.12,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Moderate Risk (RM7x7 S:2 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate + Very Low Risk (RM5x5 S:2 L:1) + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low + + 0.08,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + + + + + + + Moderate Risk (RM7x7 S:2 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate - 0.24,xsd:decimal + 0.29,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Compromise Account - Something that acts as or causes a compromised account that is then used by the compromiser + Authorisation Failure + Something that acts as or causes Authorisation Failure + + - + 2022-08-17 2024-08-16 accepted @@ -2278,28 +2244,39 @@ - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - Risk Management - Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk - - ISO 31073:2022 Risk management vocabulary - 2024-06-12 + + Terrorism + Something that acts as or causes Terrorism + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - - - - - - - - - Risk Concepts - RDF/XML serialiation + - - + + + + + Benefit + Something that acts as or causes benefits + + 2022-03-23 + 2024-08-16 + accepted + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres + + @@ -2313,14 +2290,35 @@ accepted Harshvardhan J. Pandit - + + + + + + + + + Risk Concepts - RDF/XML serialiation + + + + + + 7 Risk Levels + Scale with 7 Risk Levels from Extremely High to Extremely Low + + 2022-08-18 + accepted + Harshvardhan J. Pandit + + - + - Low Risk (RM5x5 S:1 L:4) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low + Low Risk (RM5x5 S:2 L:2) + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low 0.16,xsd:decimal 2022-08-17 @@ -2329,168 +2327,174 @@ - + - Very High Risk (RM5x5 S:3 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High - - 0.60,xsd:decimal + Extremely High Risk (RM7x7 S:7 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High + + 0.86,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Unauthorised Re-Identification - Something that acts as or causes Unauthorised Re-Identification - - 2022-08-19 - 2024-08-16 + Threat + Risk source event which causes Risk + + + 2024-02-14 accepted - Georg P. Krog - + - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - - + + Extremely Low Likelihood + Level where Likelihood is Extremely Low + + 0.01,xsd:decimal + The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 + 2022-08-18 accepted + Harshvardhan J. Pandit - + - + - - Very High Risk (RM7x7 S:4 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High - - 0.57,xsd:decimal - 2022-08-17 + + Low Risk + Level where Risk is Low + + + + 0.25,xsd:decimal + The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - Equipment Malfunction - Something that acts as or causes Equipment Malfunction - - Here equipment refers to physical equipment - - 2022-08-17 - 2024-08-16 + Violating Policy + Something that acts as or causes violation of policy which can be either internal or external policy + accepted - Harshvardhan J. Pandit - + - - 7 Severity Levels - Scale with 7 Severity Levels from Extremely High to Extremely Low - + + Violation of Rights + Something that acts as or causes Violation of Rights + + This concept was called "ViolationOfRights" in DPV 2.0 2022-08-18 + 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog, Harshvardhan J. Pandit - + - + - - Unauthorised System Modification - Something that acts as or causes Unauthorised System Modification - - - 2022-08-17 - 2024-08-16 + + Monitor Impact + Control that monitors a Risk Impact + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + - - Extremely High Risk (RM7x7 S:7 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High - - 0.99,xsd:decimal - 2022-08-17 + + Security Attack + Something that acts as or causes an attack on security with the aim of undermining it + + + + accepted - Harshvardhan J. Pandit - + - - + - exploits vulnerability - Indicates the threat (subject) exploits the indicated vulnerability (object) - - - - - 2024-02-14 + + + Very Low Risk + Level where Risk is Very Low + + + 0.1,xsd:decimal + The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 + 2022-08-18 accepted + Harshvardhan J. Pandit - + - + - - System Failure - Something that acts as or causes System Failure - - Here system refers to both hardware and software systems - + + Moderate Risk (RM7x7 S:5 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate + + 0.31,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Unauthorised Information Disclosure - Something that acts as or causes Unauthorised Information Disclosure - - - 2022-08-17 - 2024-08-16 + + 5 Severity Levels + Scale with 5 Severity Levels from Very High to Very Low + + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - Unwanted Code Deletion - Something that acts as or causes Unwanted Code Deletion + Unauthorised Resource Use + Something that acts as or causes Unauthorised Resource Use + - + 2022-08-17 2024-08-16 accepted @@ -2498,106 +2502,94 @@ - + - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - - Denial of Service Attack (DoS) - Something that acts as or causes Denial of Service Attack (DoS) - - - + + Very High Risk (RM7x7 S:3 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High + + 0.43,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Unauthorised Data Access - Something that acts as or causes Unauthorised Data Access - - + Violation of Legal Obligations + Something that acts as or causes Violation of Legal Obligations + + This concept was called "ViolationRegulatoryObligations" in DPV 2.0 + 2022-08-17 2024-08-16 - accepted + modified Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - + - - 7 Risk Levels - Scale with 7 Risk Levels from Extremely High to Extremely Low - - 2022-08-18 + + Very High Risk (RM7x7 S:4 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High + + 0.57,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + - - - Low Risk (RM7x7 S:1 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low - - 0.14,xsd:decimal + + + Lose of Reputation + Something that acts as or causes Loss of Reputation + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Monitor Control - Risk Mitigation Measure that uses controls to monitor events - - Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised. + Incident Handling Report + A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence + + 2024-05-19 accepted - Harshvardhan J. Pandit - + - + - Unauthorised System Access - Something that acts as or causes Unauthorised System Access + Spoofing + Something that acts as or causes Spoofing + + - + + + 2022-08-17 2024-08-16 accepted @@ -2605,137 +2597,121 @@ - + + + + + Remuneration + Something that acts as or provides renumeration which is in monetary or financial form + + 2024-04-14 + 2024-08-16 + accepted + Georg P. Krog, Harshvardhan J. Pandit + + + + ENISA Reference Incident Classification Taxonomy 2018 https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - - Material Damage - Something that acts as or causes Material Damage - - The criteria for what is considered material damage is based in jurisdictional laws and norms - 2022-03-30 - 2024-08-16 + + Incident Status Unknown + The status of a incident is unknown + + 2024-02-14 accepted Harshvardhan J. Pandit - + - + - Unauthorised Code Modification - Something that acts as or causes Unauthorised Code Modification + Unauthorised Re-Identification + Something that acts as or causes Unauthorised Re-Identification + - - 2022-08-17 + 2022-08-19 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog - - - - Risk Assessment - Assessment of risk involving its identification, analysis, and evaluation - - - ISO 31073:2022 Risk management vocabulary - 2024-02-14 - accepted - - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - Moderate Risk (RM5x5 S:3 L:2) - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate + Very High Risk (RM5x5 S:4 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High - 0.24,xsd:decimal + 0.80,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - High Severity - Level where Severity is High - - - - 0.75,xsd:decimal - The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 - 2022-08-18 + + Monitor Consequence + Control that monitors a Risk Consequence + + 2024-05-19 accepted Harshvardhan J. Pandit - + - - - - - Very Low Risk (RM7x7 S:3 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low - - 0.12,xsd:decimal - 2022-08-17 - accepted - Harshvardhan J. Pandit - - + + + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - + - - System Malfunction - Something that acts as or causes System Malfunction - - Here system refers to both hardware and software systems - - 2022-08-17 - 2024-08-16 + Incident Notice + Notice associated with an Incident + + + 2024-05-19 accepted - Harshvardhan J. Pandit - + - + - Discrimination - Something that acts as or causes Discrimination - - 2022-08-19 - 2024-08-16 + Accidental Misuse + Accidental Misuse + accepted - Georg P. Krog - + - - Very Low Risk - Level where Risk is Very Low - - + + Very Low Likelihood + Level where Likelihood is Very Low + + 0.1,xsd:decimal The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 2022-08-18 @@ -2744,99 +2720,152 @@ - + - Moderate Risk (RM5x5 S:3 L:3) - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate + Very Low Risk (RM5x5 S:3 L:1) + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low - 0.36,xsd:decimal + 0.12,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + + + + Recovery Control + Control to recover from event + + 2024-05-19 + accepted + + + + - Very Low Risk (RM7x7 S:2 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low + Extremely Low Risk (RM7x7 S:1 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - 0.12,xsd:decimal + 0.02,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Re-identification - Something that acts as or causes Re-identification - - Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification - 2022-08-19 - 2024-08-16 + Reputational Risk + Risks and issues that affect the reputation of the organisation + accepted - Harshvardhan J. Pandit - + - Incident Impact Assessment - An impact assessment associated with a incident - - + + Moderate Risk (RM7x7 S:2 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate + + 0.24,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + + + + + + Incident Ongoing Report + A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated + + 2024-05-19 accepted - Harshvardhan J. Pandit - + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + + Low Likelihood + Level where Likelihood is Low + + + + 0.25,xsd:decimal + The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 + 2022-08-18 + accepted + Harshvardhan J. Pandit + + + + + + + + + + accepted + + - + - Reward - Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee - - 2024-04-14 + Injury + Something that acts as or causes Injury + + + 2022-08-17 2024-08-16 accepted - Georg P. Krog, Harshvardhan J. Pandit + Harshvardhan J. Pandit - + - Very High Risk (RM5x5 S:5 L:4) - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High - - 0.80,xsd:decimal + Moderate Risk (RM3x3 S:3 L:1) + Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate + + 0.33,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Equipment Failure - Something that acts as or causes Equipment Failure - - Here equipment refers to physical equipment - + Sexual Violence + Something that acts as or causes Sexual Violence + + 2022-08-17 2024-08-16 accepted @@ -2844,207 +2873,276 @@ - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - - Extremely High Risk (RM7x7 S:5 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High - - 0.61,xsd:decimal - 2022-08-17 + + Reduce Severity + Control that reduces the severity of an event + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + - - Violating Ethics Code - Something that acts as or causes Violation of Ethics Code - - This concept was called "ViolationEthicalCode" in DPV 2.0 - + + Very Low Risk (RM5x5 S:1 L:3) + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low + + 0.12,xsd:decimal 2022-08-17 - 2024-08-16 - modified + accepted Harshvardhan J. Pandit - + - + - - Incident Concluded - The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring - - 2024-02-14 + + Unauthorised System Access + Something that acts as or causes Unauthorised System Access + + + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Very High Risk (RM5x5 S:5 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High + Moderate Risk (RM5x5 S:4 L:2) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - 0.99,xsd:decimal + 0.32,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Low Severity - Level where Severity is Low - - - - 0.25,xsd:decimal - The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 - 2022-08-18 + + Unauthorised Code Modification + Something that acts as or causes Unauthorised Code Modification + + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Monitor Vulnerabilities - Control that monitors a Risk Vulnerability - + Reduction Control + Control that reduces the likelihood or severity of an event + 2024-05-19 accepted - Harshvardhan J. Pandit - + + + + Threat Source + Source of threat event, including both agent and non-agent sources + + 2024-02-14 + accepted + + + + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - Intentional Misuse - Intentional Misuse - + User Risks + Concepts associated with risks that arise due to User or Human use + accepted - + - Unauthorised Code Disclosure - Something that acts as or causes Unauthorised Code Disclosure - - - 2022-08-17 + Material Damage + Something that acts as or causes Material Damage + + The criteria for what is considered material damage is based in jurisdictional laws and norms + 2022-03-30 2024-08-16 accepted Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + exploits vulnerability + Indicates the threat (subject) exploits the indicated vulnerability (object) + + + + + 2024-02-14 + accepted + + - + - - System Intrusion - Something that acts as or causes System Intrusion - - - 2022-08-17 - 2024-08-16 + Individual Risk + Risks and issues that affect or have the potential to affect specific individuals accepted - Harshvardhan J. Pandit - + - Physical Harm - + Unauthorised System Modification + Something that acts as or causes Unauthorised System Modification + + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - has incident - Indicates an incident is associated with the specified context - - + is exploited by + Indicates the vulnerability (subject) is exploited by the indicated threat (object) + + + + 2024-02-14 accepted - + - Share Risk - Risk Mitigation Measure that shares Risk e.g. amongst stakeholders + Detection Control + Control to detect event 2024-05-19 accepted - Harshvardhan J. Pandit - + + + + + Low Risk (RM7x7 S:2 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low + + 0.16,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + + + + + + + Very High Risk (RM7x7 S:6 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High + + 0.61,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + + + - Reduce Likelihood - Control that reduces the likelihood of an event - + Containment Control + Control to contain event + 2024-05-19 accepted - Harshvardhan J. Pandit - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + + + Very High Risk (RM7x7 S:6 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High + + 0.49,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + + + - Impact to Rights - Something that acts as or causes Impact to Rights - - - This concept was called "ImpactToRights" in DPV 2.0 - + Human Errors + Something that acts as or causes Human Errors + + 2022-08-17 2024-08-16 accepted @@ -3052,131 +3150,115 @@ - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - - - Primer for Data Privacy Vocabulary - - - - - - - - Reduction Control - Control that reduces the likelihood or severity of an event - - 2024-05-19 - accepted - - - - + - Brute Force Authorisations - Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques + Unauthorised Activity + Something that acts as or causes Unauthorised Activity + + + - - 2022-08-17 - 2024-08-16 accepted - Harshvardhan J. Pandit - + - Incident - An actual or occured event - - - - Incident is realised or materialised risk - 2024-02-14 + + Remove Impact + Control that removes Impact i.e. prevents it from materialising + 2024-05-19 - 2024-08-16 accepted - Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez - - + Harshvardhan J. Pandit - - + - + - - Judicial Costs - Something that involves or causes judicial costs to be paid - + + Incident Near Miss + The state where an incident was almost successful in taking place i.e. "it came very close" + + 2024-02-14 accepted + Harshvardhan J. Pandit - + - + - - Data Corruption - Something that acts as or causes Corruption of Data - - This concept was called "Corruption Data" in DPV 2.0 - - 2022-08-17 - 2024-08-16 - modified + + High Severity + Level where Severity is High + + + + 0.75,xsd:decimal + The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 + 2022-08-18 + accepted Harshvardhan J. Pandit - + - + - Moderate Risk (RM3x3 S:1 L:3) - Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate - - 0.33,xsd:decimal + Low Risk (RM5x5 S:5 L:1) + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low + + 0.20,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + - - Identity Fraud - Something that acts as or causes Identity Fraud - - + + Low Risk (RM7x7 S:4 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low + + 0.16,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Illegal Data Processing - Something that acts as or causes Illegal Processing of Data - - This concept was called "IllegalProcessingData" in DPV 2.0 - + Coercion + Something that acts as or causes Coercion + + + 2022-08-17 2024-08-16 accepted @@ -3184,99 +3266,123 @@ - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - - Fee - Something that acts as or provides fees e.g. for using a service - - DGA 2.10 - 2024-04-14 - 2024-08-16 - modified - Georg P. Krog, Harshvardhan J. Pandit + Integrity Incident + Incident where the integrity of information or system has been affected + + + 2024-05-19 + accepted - + - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - - Very High Risk (RM7x7 S:3 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High - - 0.43,xsd:decimal + + Equipment Failure + Something that acts as or causes Equipment Failure + + + Here equipment refers to physical equipment + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Very Low Risk (RM5x5 S:1 L:1) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low - - 0.04,xsd:decimal + Low Risk (RM3x3 S:1 L:1) + Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low + + 0.11,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - Coercion - Something that acts as or causes Coercion - - - 2022-08-17 + Damage + Something that acts as or causes Damage + + 2022-03-30 2024-08-16 accepted Harshvardhan J. Pandit - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - - High Risk (RM3x3 S:3 L:3) - Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High - - 0.99,xsd:decimal - 2022-08-17 + + Avoid Source + Control that avoids the risk source + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + - - Consequence Control - Risk Mitigation Measure that controls the Consequences - - 2024-05-19 + + Low Risk (RM5x5 S:1 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low + + 0.20,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + - Blackmail - Something that acts as or causes Blackmail - - + Lose of Opportunity + Something that acts as or causes Loss of Opportunity + + 2022-08-17 2024-08-16 accepted @@ -3284,69 +3390,63 @@ - + - Extremely High Risk (RM7x7 S:6 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High - - 0.73,xsd:decimal + Risk Matrix 7x7 + A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types + 2022-08-17 accepted Harshvardhan J. Pandit - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - Moderate Risk (RM5x5 S:2 L:3) - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate - - 0.24,xsd:decimal + Very Low Risk (RM7x7 S:1 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low + + 0.12,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Low Risk - Level where Risk is Low - - - - 0.25,xsd:decimal - The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 - 2022-08-18 + + High Risk (RM3x3 S:3 L:2) + Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + + 0.67,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - + - Scam - Something that acts as or causes Scam + Malware Attack + Something that acts as or causes Malware Attack + + + - + 2022-08-17 2024-08-16 accepted @@ -3354,111 +3454,93 @@ - - - - - Remove Impact - Control that removes Impact i.e. prevents it from materialising - - 2024-05-19 - accepted - Harshvardhan J. Pandit - - - - + - Extremely Low Risk (RM7x7 S:3 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - - 0.06,xsd:decimal + High Risk (RM3x3 S:3 L:3) + Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High + + 0.99,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - + - - External Security Threat - Concepts associated with security threats that are likely to originate externally - + + Remedy Control + Control to remedy consequences of event + + 2024-05-19 accepted - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - - + - has threat source - Indicates the threat (subject) has the indicated source (object) - - - - - 2024-02-14 + + + Low Risk (RM5x5 S:4 L:1) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low + + 0.16,xsd:decimal + 2022-08-17 accepted + Harshvardhan J. Pandit - + - + - Low Risk (RM7x7 S:2 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low - - 0.16,xsd:decimal + Moderate Risk (RM3x3 S:2 L:2) + Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate + + 0.44,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - Very Low Risk (RM5x5 S:2 L:1) - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low + Very High Risk (RM5x5 S:5 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High - 0.08,xsd:decimal + 0.99,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + + + + Reward + Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + + 2024-04-14 + 2024-08-16 + accepted + Georg P. Krog, Harshvardhan J. Pandit + + + + - caused by vulnerability - Indicates the associated context (subject) is caused by the indicated vulnerability (object) + has vulnerability + Indicates the associated context (subject) has indicated vulnerability (object) 2024-02-14 @@ -3466,157 +3548,158 @@ - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - - Extremely Low Risk (RM7x7 S:1 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low - - 0.06,xsd:decimal - 2022-08-17 + + 7 Severity Levels + Scale with 7 Severity Levels from Extremely High to Extremely Low + + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - Integrity Incident - Incident where the integrity of information or system has been affected - - - 2024-05-19 + + High Risk (RM5x5 S:5 L:2) + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High + + 0.40,xsd:decimal + 2022-08-17 accepted + Harshvardhan J. Pandit - + - + - - Terrorism - Something that acts as or causes Terrorism - - + + High Risk (RM5x5 S:2 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High + + 0.40,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - + - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - - Unauthorised Resource Use - Something that acts as or causes Unauthorised Resource Use - - - 2022-08-17 - 2024-08-16 + + High Risk + Level where Risk is High + + + + 0.75,xsd:decimal + The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - - High Risk (RM5x5 S:4 L:3) - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High - - 0.48,xsd:decimal - 2022-08-17 + + Monitor Risk + Control that monitors a Risk + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - Low Risk (RM5x5 S:4 L:1) - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low + Moderate Risk (RM5x5 S:3 L:3) + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate - 0.16,xsd:decimal + 0.36,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Violence against children - Something that acts as or causes Child Violence - - This concept was called "ChildViolence" in DPV 2.0 - + + Risk Matrix 3x3 + A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types + 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - - - - - - caused by threat - Indicates the cause of associated context (subject) was the indicated threat (object) - - - 2024-02-14 - accepted - - + - + - Extremely Low Risk (RM7x7 S:4 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low + Extremely Low Risk (RM7x7 S:3 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - 0.08,xsd:decimal + 0.06,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - + - is vulnerability of - Indicates the vulnerability (subject) is associated with indicated context (object) - - - 2024-02-14 + + Incident Register + A register recording incidentes, their reports, notifications, and other related activities + + + 2024-05-19 accepted + Harshvardhan J. Pandit - + - + + + + + + + Risk Concepts - JSON-LD serialiation + + - Unauthorised Access to Premises - Something that acts as or causes Unauthorised Access to Premises - - + Confidentiality Breach + Something that acts as or causes Confidentiality Breach + + + 2022-08-17 2024-08-16 accepted @@ -3624,238 +3707,232 @@ - + - Individual Risk - Risks and issues that affect or have the potential to affect specific individuals + Incident Preliminary Report + A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known + + + 2024-05-19 accepted - + - + - - Component Failure - Something that acts as or causes Component Failure - - Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of + + Low Risk (RM7x7 S:7 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low + + 0.14,xsd:decimal + 2022-08-17 accepted + Harshvardhan J. Pandit - + - + - - Incident Halted - The incident has halted or paused with a high likelihood of resuming or recurring - - 2024-02-14 + + Very High Risk (RM7x7 S:4 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High + + 0.49,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + - Misuse - Something that acts as or causes Misuse - - 2024-06-11 + Lose of Goodwill + Something that acts as or causes Loss of Goodwill + + + 2022-08-17 2024-08-16 accepted - Delaram Golpayegani + Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - refers to risk - Indicates the incident (subject) is a materialisation of the indicated risk (object) - - - - - 2024-02-14 - accepted - - - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - - Extremely Low Severity - Level where Severity is Extremely Low - - 0.01,xsd:decimal - The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 + + Limitation of Rights + Something that acts as or causes Limitation of Rights + + This concept was called "LimitationOfRights" in DPV 2.0 2022-08-18 + 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog, Harshvardhan J. Pandit - + - + - Environmental Risk - Risks and issues that have their origin in environment or can affect the environment at large + Legal Risk + Risks and issues that have their basis in legal requirements and enforcement accepted - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - - Monitor Risk Source - Control that monitors a Risk Source - - 2024-05-19 + + Personal Safety Endangerment + Something that acts as or causes Personal Safety Endangerment + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Benefit - Something that acts as or causes benefits - - 2022-03-23 - 2024-08-16 + Physical Harm + accepted - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres - + - - Low Risk (RM5x5 S:1 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low - - 0.20,xsd:decimal - 2022-08-17 + + 3 Likelihood Levels + Scale with 3 Likelihood Levels from High to Low + + 2022-08-18 accepted Harshvardhan J. Pandit - + - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - - High Risk - Level where Risk is High - - - - 0.75,xsd:decimal - The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 - 2022-08-18 + + Low Risk (RM7x7 S:1 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low + + 0.14,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + - Very Low Risk (RM7x7 S:1 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low + Extremely High Risk (RM7x7 S:7 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High - 0.08,xsd:decimal + 0.99,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Violation of Rights - Something that acts as or causes Violation of Rights - - This concept was called "ViolationOfRights" in DPV 2.0 - 2022-08-18 + Erroneous System Use + Something that acts as or causes Erroneous System Use + + + 2022-08-17 2024-08-16 accepted - Georg P. Krog, Harshvardhan J. Pandit + Harshvardhan J. Pandit - + - Monitor Consequence - Control that monitors a Risk Consequence - + Reduce Likelihood + Control that reduces the likelihood of an event + 2024-05-19 accepted Harshvardhan J. Pandit - + - Remove Consequence - Control that removes Consequence i.e. prevents it from materialising - + Monitor Vulnerabilities + Control that monitors a Risk Vulnerability + 2024-05-19 accepted Harshvardhan J. Pandit - + + + + + Very High Severity + Level where Severity is Very High + + + 0.9,xsd:decimal + The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 + 2022-08-18 + accepted + Harshvardhan J. Pandit + + + + - Harm - Something that acts as or causes Harm to humans - - This concept refers to the general abstract notion of harm - 2022-08-13 + Compensation + Something that acts as or provides compensation - which can be monetary and financial or in other forms + + 2024-04-14 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog, Harshvardhan J. Pandit + + + @@ -3870,57 +3947,15 @@ - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - Vulnerability - Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk - - 2024-02-14 - accepted - - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - Societal Risk - Risks and issues that affect or have the potential to affect society at large or specific groups in society - - accepted - - - - - - - - Judicial Penalty - Something that involves or causes judicial penalties to be paid - - accepted - - - - + - Lose of Trust - Something that acts as or causes Loss of Trust - - + Unauthorised Information Disclosure + Something that acts as or causes Unauthorised Information Disclosure + + + 2022-08-17 2024-08-16 accepted @@ -3928,203 +3963,163 @@ - - - - - Compensation - Something that acts as or provides compensation - which can be monetary and financial or in other forms - - 2024-04-14 - 2024-08-16 - accepted - Georg P. Krog, Harshvardhan J. Pandit - - + + - + - Cross-Border Incident - Incident involving cross-border or multiple jurisdictions - - + + Change Consequence + Control that changes Consequence + 2024-05-19 accepted + Harshvardhan J. Pandit - + - + - - Incident Status Unknown - The status of a incident is unknown - - 2024-02-14 + + Extremely High Likelihood + Level where Likelihood is Extremely High + + 0.99,xsd:decimal + The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - - Extremely High Risk - Level where Risk is Extremely High - - 0.99,xsd:decimal - The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 + + Very High Likelihood + Level where Likelihood is Very High + + + 0.9,xsd:decimal + The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 2022-08-18 accepted Harshvardhan J. Pandit - + - High Risk (RM7x7 S:6 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High + Very Low Risk (RM7x7 S:5 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low - 0.37,xsd:decimal + 0.10,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ENISA Threat Landscape for Ransomware Attacks 2022 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - - - - - - Legal Risk - Risks and issues that have their basis in legal requirements and enforcement - - accepted - - - - + + - - - Internal Security Threat - Concepts associated with security threats and issues that originate within the organisation - + is vulnerability of + Indicates the vulnerability (subject) is associated with indicated context (object) + + + 2024-02-14 accepted - + - + - - Individual Health & Safety - + + Impact Control + Risk Mitigation Measure that controls Impacts + + 2024-05-19 accepted + Harshvardhan J. Pandit - + - + - - Extremely Low Risk - Level where Risk is Extremely Low - - 0.01,xsd:decimal - The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 - 2022-08-18 + + Very Low Risk (RM5x5 S:1 L:2) + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low + + 0.08,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + - - Non-Material Damage - Something that acts as or causes Non-Material Damage - - The criteria for what is considered material damage is based in jurisdictional laws and norms - 2022-03-30 - 2024-08-16 + + Very Low Risk (RM7x7 S:3 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low + + 0.12,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + - - Very High Severity - Level where Severity is Very High - - - 0.9,xsd:decimal - The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 + + 3 Risk Levels + Scale with 3 Risk Levels from High to Low + 2022-08-18 accepted Harshvardhan J. Pandit - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - - Unwanted Data Deletion - Something that acts as or causes Unwanted Data Deletion - - + + Moderate Risk (RM5x5 S:2 L:4) + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate + + 0.32,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - - - - - - - Remedy Control - Control to remedy consequences of event - - 2024-05-19 - accepted - - + - + - Exposure to Harmful Speech - Something that acts as or causes Harmful Speech - - This concept was called "HarmfulSpeech" in DPV 2.0 - + Security Breach + Something that acts as or causes Security Breach + + + + + 2022-08-17 2024-08-16 accepted @@ -4132,61 +4127,77 @@ - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - 5 Severity Levels - Scale with 5 Severity Levels from Very High to Very Low - + Low Severity + Level where Severity is Low + + + + 0.25,xsd:decimal + The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 2022-08-18 accepted Harshvardhan J. Pandit - + - - Monitor Impact - Control that monitors a Risk Impact - + + Environmental Risk + Risks and issues that have their origin in environment or can affect the environment at large + + accepted + + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + Confidentiality Incident + Incident where the confidentiality of information or system has been affected + + 2024-05-19 accepted - Harshvardhan J. Pandit - + - + - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - + - - Incident Suspected - The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing - - 2024-02-14 + + Extremely High Risk + Level where Risk is Extremely High + + 0.99,xsd:decimal + The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - High Risk (RM5x5 S:5 L:3) - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High + Very High Risk (RM5x5 S:3 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High 0.60,xsd:decimal 2022-08-17 @@ -4195,28 +4206,48 @@ - + - - Extremely Low Risk (RM7x7 S:2 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low - - 0.08,xsd:decimal - 2022-08-17 + + Individual Health & Safety + accepted - Harshvardhan J. Pandit - + - + + + + + Primer for Data Privacy Vocabulary + + + + + + + + + + Risk Concepts - Turtle serialiation + + + + + + Examples for Data Privacy Vocabulary + + + + - Limitation of Rights - Something that acts as or causes Limitation of Rights + Prevent Exercising of Rights + Something that acts as or causes Prevent Exercising of Rights - This concept was called "LimitationOfRights" in DPV 2.0 + This concept was called "PreventExercisingOfRights" in DPV 2.0 2022-08-18 2024-08-16 accepted @@ -4224,152 +4255,229 @@ - + + + + + Change Impact + Control that changes Impact + + 2024-05-19 + accepted + Harshvardhan J. Pandit + + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + Cross-Border Incident + Incident involving cross-border or multiple jurisdictions + + + 2024-05-19 + accepted + + + + + + IEC 31010:2019 + https://www.iso.org/standard/72140.html + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - Moderate Risk (RM5x5 S:4 L:2) - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - - 0.32,xsd:decimal + Moderate Risk (RM7x7 S:7 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate + + 0.29,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Very Low Likelihood - Level where Likelihood is Very Low - - - 0.1,xsd:decimal - The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 - 2022-08-18 + Incident Assessment Report + A report describing the assessment of an incident in terms of its effects or impacts + + + 2024-05-19 + accepted + + + + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + + + Guides for Data Privacy Vocabulary + + + + + + + Incident Concluding Report + A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known + + + 2024-05-19 accepted - Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - + - Sabotage - Something that acts as or causes Sabotage - - - 2022-08-17 + Misuse + Something that acts as or causes Misuse + + 2024-06-11 2024-08-16 accepted - Harshvardhan J. Pandit + Delaram Golpayegani - + - - 3 Risk Levels - Scale with 3 Risk Levels from High to Low - - 2022-08-18 + + External Security Threat + Concepts associated with security threats that are likely to originate externally + accepted - Harshvardhan J. Pandit - + - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + ENISA Threat Landscape for Ransomware Attacks 2022 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + + + + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - - Accidental Misuse - Accidental Misuse - + + Very Low Severity + Level where Severity is Very Low + + + 0.1,xsd:decimal + The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 + 2022-08-18 accepted + Harshvardhan J. Pandit - + - + - - Extremely High Risk (RM7x7 S:6 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High - - 0.86,xsd:decimal - 2022-08-17 + + Consequence Control + Risk Mitigation Measure that controls the Consequences + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + - - Very Low Risk (RM5x5 S:3 L:1) - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low - - 0.12,xsd:decimal + + Physical Assault + Something that acts as or causes Physical Assault + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Moderate Risk (RM3x3 S:3 L:1) - Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - - 0.33,xsd:decimal - 2022-08-17 + + + accepted - Harshvardhan J. Pandit - + - + - Incident Ongoing Report - A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated - - - 2024-05-19 + + Societal Risk + Risks and issues that affect or have the potential to affect society at large or specific groups in society + accepted - + - + - - Low Risk (RM3x3 S:1 L:1) - Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - - 0.11,xsd:decimal - 2022-08-17 + + Monitor Control + Control that monitors another Control + + 2024-05-19 accepted Harshvardhan J. Pandit - - - - - ENISa Trust Services Security Incidents 2021 - https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 + @@ -4384,400 +4492,332 @@ - + + + ENISA Threat Landscape 2021 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 + + - - Extremely Low Likelihood - Level where Likelihood is Extremely Low - - 0.01,xsd:decimal - The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 - 2022-08-18 + Risk Management + Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk + + ISO 31073:2022 Risk management vocabulary + 2024-06-12 accepted - Harshvardhan J. Pandit - + - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Threat Landscape for Ransomware Attacks 2022 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - + - Very High Risk (RM7x7 S:7 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High - - 0.57,xsd:decimal + High Risk (RM5x5 S:5 L:3) + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High + + 0.60,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + + IEC 31010:2019 + https://www.iso.org/standard/72140.html + + + + + + + + Risk Concepts - HTML serialiation + + - - Operational Security Risk - Risks and issues that arise during operational processes - + Incident Identifier + Identifier associated with an incident + + 2024-05-19 accepted - + - + + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + - Incident Register - A register recording incidentes, their reports, notifications, and other related activities - - + Incident Mitigation Measure + A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again + + 2024-05-19 accepted - Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + + Source Control + Risk Mitigation Measure that controls the Source + + 2024-05-19 + accepted + Harshvardhan J. Pandit + + - + - - Unauthorised Data Modification - Something that acts as or causes Unauthorised Data Modification - - - 2022-08-17 - 2024-08-16 + + High Likelihood + Level where Likelihood is High + + + + 0.75,xsd:decimal + The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - - Extremely High Severity - Level where Severity is Extremely High - - 0.99,xsd:decimal - The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 - 2022-08-18 + + Extremely Low Risk (RM7x7 S:1 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low + + 0.04,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - - - - + - + ENISA Methodology for Sectoral Cybersecurity Assessments https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - + - - Compromise Account Credentials - Something that acts as or causes Account Credentials to be compromised - - - 2022-08-17 - 2024-08-16 + + 7 Likelihood Levels + Scale with 7 Likelihood Levels from Extremely High to Extremely Low + + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - - Very Low Risk (RM5x5 S:1 L:3) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low - - 0.12,xsd:decimal - 2022-08-17 + + Incident Halted + The incident has halted or paused with a high likelihood of resuming or recurring + + 2024-02-14 accepted Harshvardhan J. Pandit - + - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + - - Incident Handling Report - A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence - - - 2024-05-19 + has incident + Indicates an incident is associated with the specified context + + + 2024-02-14 accepted - + - + + - - - High Risk (RM7x7 S:7 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High - - 0.43,xsd:decimal - 2022-08-17 + has control + Indicates the use of specified control + + + 2024-02-14 accepted - Harshvardhan J. Pandit - + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - ENISA Threat Landscape for Ransomware Attacks 2022 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - + - - Identity Theft - Something that acts as or causes Identity Theft - - - 2022-08-17 - 2024-08-16 + + Incident Terminated + The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring + + 2024-02-14 accepted Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - - - Risk Concepts - JSON-LD serialiation - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - + ENISA Reference Incident Classification Taxonomy 2018 https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + ENISA Threat Taxonomy 2016 https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - + + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - Incident Suspected Report - A report describing the suspicion of an incident in the past or occuring - - - 2024-05-19 + + Moderate Risk (RM7x7 S:4 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate + + 0.24,xsd:decimal + 2022-08-17 accepted + Harshvardhan J. Pandit - + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - - Incident Identifier - Identifier associated with an incident - - 2024-05-19 - accepted - - - - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - - Incident Detection Report - A report describing the detection of a Incident - - - 2024-05-19 - accepted - - - - + - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - - - - - - Risk Concepts - N3 serialiation + + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - - - - - Security Attack - Something that acts as or causes an attack on security with the aim of undermining it - - accepted - - - - + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - diff --git a/2.1-dev/risk/risk.ttl b/2.1-dev/risk/risk.ttl index 2c375f60a..bf771fc79 100644 --- a/2.1-dev/risk/risk.ttl +++ b/2.1-dev/risk/risk.ttl @@ -156,7 +156,9 @@ risk:AuthorisationFailure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Authorisation Failure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Authorisation Failure"@en . @@ -166,7 +168,8 @@ risk:AvailabilityBreach a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:DataBreach ; + skos:broader risk:AvailabilityConcept, + risk:DataBreach ; skos:inScheme risk:risk-consequences-classes . risk:AvailabilityIncident a rdfs:Class, @@ -216,7 +219,8 @@ risk:Blackmail a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Blackmail"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Blackmail"@en . @@ -232,7 +236,9 @@ risk:BruteForceAuthorisations a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Brute Force Authorisations"@en . @@ -272,7 +278,8 @@ risk:Coercion a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Coercion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Coercion"@en . @@ -295,7 +302,8 @@ risk:ComponentFailure a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Component Failure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Component Failure"@en ; @@ -306,7 +314,8 @@ risk:ComponentMalfunction a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Component Malfunction"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Component Malfunction"@en ; @@ -323,7 +332,10 @@ risk:CompromiseAccount a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Compromise Account"@en . @@ -339,7 +351,8 @@ risk:CompromiseAccountCredentials a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:ConfidentialityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Compromise Account Credentials"@en . @@ -355,7 +368,8 @@ risk:ConfidentialityBreach a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:DataBreach ; + skos:broader risk:ConfidentialityConcept, + risk:DataBreach ; skos:definition "Something that acts as or causes Confidentiality Breach"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Confidentiality Breach"@en . @@ -432,7 +446,8 @@ risk:Cryptojacking a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Cryptojacking"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Cryptojacking"@en . @@ -463,7 +478,10 @@ risk:DataBreach a rdfs:Class, dex:E0071 ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SecurityBreach ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:SecurityBreach ; skos:definition "Something that acts as or causes Data Breach"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Data Breach"@en . @@ -479,7 +497,8 @@ risk:DataCorruption a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:IntegrityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Corruption of Data"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Data Corruption"@en ; @@ -503,14 +522,12 @@ risk:DenialServiceAttack a rdfs:Class, dct:created "2022-08-17"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ], - [ a schema:WebPage ; schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Denial of Service Attack (DoS)"@en . @@ -563,7 +580,8 @@ risk:DistributedDenialServiceAttack a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en . @@ -600,7 +618,8 @@ risk:EquipmentFailure a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Equipment Failure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Equipment Failure"@en ; @@ -617,7 +636,8 @@ risk:EquipmentMalfunction a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Equipment Malfunction"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Equipment Malfunction"@en ; @@ -677,7 +697,8 @@ risk:Extorsion a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Extorsion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Extorsion"@en . @@ -817,7 +838,8 @@ risk:Fraud a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Fraud"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Fraud"@en . @@ -934,7 +956,8 @@ risk:IdentityFraud a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:ConfidentialityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Identity Fraud"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Identity Fraud"@en . @@ -950,7 +973,8 @@ risk:IdentityTheft a rdfs:Class, schema:url "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:ConfidentialityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Identity Theft"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Identity Theft"@en . @@ -1294,7 +1318,8 @@ risk:IntegrityBreach a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:DataBreach ; + skos:broader risk:DataBreach, + risk:IntegrityConcept ; skos:inScheme risk:risk-consequences-classes . risk:IntegrityIncident a rdfs:Class, @@ -1329,22 +1354,13 @@ risk:InterceptCommunications a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Interception of Communications"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Intercept Communications"@en ; skos:scopeNote "This concept was called \"InterceptionCommunications\" in DPV 2.0"@en . -risk:InternalSecurityThreat a rdfs:Class, - skos:Concept, - dpv:RiskConcept ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader dpv:RiskConcept ; - skos:definition "Concepts associated with security threats and issues that originate within the organisation"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Internal Security Threat"@en . - risk:JudicialCosts a rdfs:Class, skos:Concept, dpv:RiskConcept ; @@ -1546,7 +1562,10 @@ risk:MaliciousCodeAttack a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Malicious Code Attack"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Malicious Code Attack"@en . @@ -1562,7 +1581,10 @@ risk:MalwareAttack a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Malware Attack"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Malware Attack"@en . @@ -1791,7 +1813,8 @@ risk:PhishingScam a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Phishing Scam"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Phishing Scam"@en . @@ -2995,7 +3018,8 @@ risk:Reidentification a rdfs:Class, dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:ConfidentialityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Re-identification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Re-identification"@en ; @@ -3268,7 +3292,9 @@ risk:Sabotage a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Sabotage"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Sabotage"@en . @@ -3284,7 +3310,8 @@ risk:Scam a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Scam"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Scam"@en . @@ -3294,7 +3321,10 @@ risk:SecurityAttack a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Security Attack"@en . @@ -3310,7 +3340,10 @@ risk:SecurityBreach a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:IntegrityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Security Breach"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Security Breach"@en . @@ -3401,7 +3434,9 @@ risk:Spoofing a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat, + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept, risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes Spoofing"@en ; skos:inScheme risk:risk-consequences-classes ; @@ -3418,7 +3453,8 @@ risk:SystemFailure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes System Failure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "System Failure"@en ; @@ -3435,7 +3471,10 @@ risk:SystemIntrusion a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes System Intrusion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "System Intrusion"@en . @@ -3451,7 +3490,8 @@ risk:SystemMalfunction a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:OperationalSecurityRisk ; + skos:broader risk:AvailabilityConcept, + risk:OperationalSecurityRisk ; skos:definition "Something that acts as or causes System Malfunction"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "System Malfunction"@en ; @@ -3505,7 +3545,10 @@ risk:UnauthorisedAccesstoPremises a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Access to Premises"@en . @@ -3515,7 +3558,10 @@ risk:UnauthorisedActivity a rdfs:Class, dpv:RiskConcept ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised Activity"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Activity"@en . @@ -3531,7 +3577,9 @@ risk:UnauthorisedCodeAccess a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised Code Access"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Code Access"@en . @@ -3547,7 +3595,8 @@ risk:UnauthorisedCodeDisclosure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Code Disclosure"@en . @@ -3563,7 +3612,8 @@ risk:UnauthorisedCodeModification a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Code Modification"@en . @@ -3579,7 +3629,8 @@ risk:UnauthorisedDataAccess a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Data Access"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Data Access"@en . @@ -3595,7 +3646,8 @@ risk:UnauthorisedDataDisclosure a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Data Disclosure"@en . @@ -3611,7 +3663,8 @@ risk:UnauthorisedDataModification a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Data Modification"@en . @@ -3627,7 +3680,8 @@ risk:UnauthorisedInformationDisclosure a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Information Disclosure"@en . @@ -3640,7 +3694,8 @@ risk:UnauthorisedReidentification a rdfs:Class, dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Re-Identification"@en . @@ -3656,7 +3711,8 @@ risk:UnauthorisedResourceUse a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised Resource Use"@en . @@ -3672,7 +3728,9 @@ risk:UnauthorisedSystemAccess a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised System Access"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised System Access"@en . @@ -3688,7 +3746,8 @@ risk:UnauthorisedSystemModification a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unauthorised System Modification"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unauthorised System Modification"@en . @@ -3704,7 +3763,9 @@ risk:UnwantedCodeDeletion a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unwanted Code Deletion"@en . @@ -3720,7 +3781,9 @@ risk:UnwantedDataDeletion a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:AvailabilityConcept, + risk:ExternalSecurityThreat, + risk:IntegrityConcept ; skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unwanted Data Deletion"@en . @@ -3736,7 +3799,8 @@ risk:UnwantedDisclosureData a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ExternalSecurityThreat ; + skos:broader risk:ConfidentialityConcept, + risk:ExternalSecurityThreat ; skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ; skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Unwanted Disclosure of Data"@en . @@ -3963,22 +4027,6 @@ risk:Vulnerability a rdfs:Class, skos:inScheme risk:core-classes ; skos:prefLabel "Vulnerability"@en . -risk:VulnerabilityCreated a rdfs:Class, - skos:Concept, - dpv:RiskConcept ; - dct:contributor "Harshvardhan J. Pandit" ; - dct:created "2022-08-17"^^xsd:date ; - dct:modified "2024-08-16"^^xsd:date ; - dct:source [ a schema:WebPage ; - schema:name "ISO/IEC 27005:2018" ; - schema:url "https://www.iso.org/standard/75281.html" ] ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:InternalSecurityThreat ; - skos:definition "Something that acts as or causes Vulnerability Created"@en ; - skos:inScheme risk:risk-consequences-classes ; - skos:prefLabel "Vulnerability Created"@en . - a owl:Ontology, profile:Profile ; dct:bibliographicCitation "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" ; diff --git a/code/jinja2_resources/template_risk.jinja2 b/code/jinja2_resources/template_risk.jinja2 index 1bddfa7e6..0f3a4c9a9 100644 --- a/code/jinja2_resources/template_risk.jinja2 +++ b/code/jinja2_resources/template_risk.jinja2 @@ -227,60 +227,64 @@ ex:ProcessB a dpv:Process ; dpv:hasImpact risk:RightsImpact . -

The risk concepts taxonomy is broadly divided into the following categories:

+

The concepts taxonomy is broadly divided into the following categories:

-
-

InternalSecurityThreat

- {{ list_hierarchy(modules['risk_consequences']['classes'], head='risk:InternalSecurityThreat') }} -
-
-

UserRisks

- {{ list_hierarchy(modules['risk_consequences']['classes'], head='risk:UserRisks') }} -
-
-

ExternalSecurityThreat

- {{ list_hierarchy(modules['risk_consequences']['classes'], head='risk:ExternalSecurityThreat') }} -
-
-

OperationalSecurityRisk

- {{ list_hierarchy(modules['risk_consequences']['classes'], head='risk:OperationalSecurityRisk') }} -
-
-

LegalRisk

- {{ list_hierarchy(modules['risk_consequences']['classes'], head='risk:LegalRisk') }} -
-
-

ReputationalRisk

- {{ list_hierarchy(modules['risk_consequences']['classes'], head='risk:ReputationalRisk') }} -
-
-

SocietalRisk

- {{ list_hierarchy(modules['risk_consequences']['classes'], head='risk:SocietalRisk') }} -
-
-

IndividualRisk

- {{ list_hierarchy(modules['risk_consequences']['classes'], head='risk:IndividualRisk') }} -
-
-

EnvironmentalRisk

- {{ list_hierarchy(modules['risk_consequences']['classes'], head='risk:EnvironmentalRisk') }} -
-
-

FinancialImpact

- {{ list_hierarchy(modules['risk_consequences']['classes'], head='risk:FinancialImpact') }} -
+
+

CIA Model

+

Confidentiality

+ {{ list_hierarchy(modules['risk_consequences']['classes'], head='risk:ConfidentialityConcept') }} + +

Integrity

+ {{ list_hierarchy(modules['risk_consequences']['classes'], head='risk:IntegrityConcept') }} + +

Availability

+ {{ list_hierarchy(modules['risk_consequences']['classes'], head='risk:AvailabilityConcept') }} +
+ +
+

User

+ {{ list_hierarchy(modules['risk_consequences']['classes'], head='risk:UserRisks') }} +
+ +
+

Legal

+ {{ list_hierarchy(modules['risk_consequences']['classes'], head='risk:LegalRisk') }} +
+ +
+

Reputational

+ {{ list_hierarchy(modules['risk_consequences']['classes'], head='risk:ReputationalRisk') }} +
+ +
+

Societal

+ {{ list_hierarchy(modules['risk_consequences']['classes'], head='risk:SocietalRisk') }} +
+ +
+

Individual

+ {{ list_hierarchy(modules['risk_consequences']['classes'], head='risk:IndividualRisk') }} +
+ +
+

Environmental

+ {{ list_hierarchy(modules['risk_consequences']['classes'], head='risk:EnvironmentalRisk') }} +
+ +
+

Financial

+ {{ list_hierarchy(modules['risk_consequences']['classes'], head='risk:FinancialImpact') }} +
diff --git a/code/vocab_csv/RiskConsequences.csv b/code/vocab_csv/RiskConsequences.csv index 42df0f08b..00ab0f50f 100644 --- a/code/vocab_csv/RiskConsequences.csv +++ b/code/vocab_csv/RiskConsequences.csv @@ -1,995 +1,991 @@ -Term,Label,Definition,ParentTerm,ParentType,Value,RelatedTerms,Relation,Usage,Source,Created,Modified,Status,Contributors,Resolution,,,,,,,,,,,,,,,,, -InternalSecurityThreat,Internal Security Threat,Concepts associated with security threats and issues that originate within the organisation,,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -VulnerabilityCreated,Vulnerability Created,Something that acts as or causes Vulnerability Created,risk:InternalSecurityThreat,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -UserRisks,User Risks,Concepts associated with risks that arise due to User or Human use,,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -Misuse,Misuse,Something that acts as or causes Misuse,risk:UserRisks,dpv:RiskConcept,,,,,,2024-06-11,2024-08-16,accepted,Delaram Golpayegani,,,,,,,,,,,,,,,,,, -IntentionalMisuse,Intentional Misuse,Intentional Misuse,risk:UserRisks,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -AccidentalMisuse,Accidental Misuse,Accidental Misuse,risk:UserRisks,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -ErroneousSystemUse,Erroneous System Use,Something that acts as or causes Erroneous System Use,risk:UserRisks,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -HumanErrors,Human Errors,Something that acts as or causes Human Errors,risk:UserRisks,dpv:RiskConcept,,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +Term,Label,Definition,ParentTerm,ParentType,Value,CIA,RelatedTerms,Relation,Usage,Source,Created,Modified,Status,Contributors,Resolution,,,,,,,,,,,,,,,,, +UserRisks,User Risks,Concepts associated with risks that arise due to User or Human use,,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +Misuse,Misuse,Something that acts as or causes Misuse,risk:UserRisks,dpv:RiskConcept,,,,,,,2024-06-11,2024-08-16,accepted,Delaram Golpayegani,,,,,,,,,,,,,,,,,, +IntentionalMisuse,Intentional Misuse,Intentional Misuse,risk:UserRisks,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +AccidentalMisuse,Accidental Misuse,Accidental Misuse,risk:UserRisks,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +ErroneousSystemUse,Erroneous System Use,Something that acts as or causes Erroneous System Use,risk:UserRisks,dpv:RiskConcept,,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +HumanErrors,Human Errors,Something that acts as or causes Human Errors,risk:UserRisks,dpv:RiskConcept,,,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -ExternalSecurityThreat,External Security Threat,Concepts associated with security threats that are likely to originate externally,,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -SecurityAttack,Security Attack,Something that acts as or causes an attack on security with the aim of undermining it,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -Cryptojacking,Cryptojacking,Something that acts as or causes Cryptojacking,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ENISA Threat Landscape 2021,https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -DenialServiceAttack,Denial of Service Attack (DoS),Something that acts as or causes Denial of Service Attack (DoS),risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -DenialServiceAttack,Denial of Service Attack (DoS),Something that acts as or causes Denial of Service Attack (DoS),risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -DistributedDenialServiceAttack,Distributed Denial of Service Attack (DDoS),Something that acts as or causes Distributed Denial of Service Attack (DDoS),risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -BruteForceAuthorisations,Brute Force Authorisations,Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -MaliciousCodeAttack,Malicious Code Attack,Something that acts as or causes Malicious Code Attack,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -MalwareAttack,Malware Attack,Something that acts as or causes Malware Attack,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ENISA Methodology for Sectoral Cybersecurity Assessments,https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -SystemIntrusion,System Intrusion,Something that acts as or causes System Intrusion,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnauthorisedActivity,Unauthorised Activity,Something that acts as or causes Unauthorised Activity,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -UnauthorisedAccesstoPremises,Unauthorised Access to Premises,Something that acts as or causes Unauthorised Access to Premises,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnauthorisedCodeAccess,Unauthorised Code Access,Something that acts as or causes Unauthorised Code Access,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ENISA Methodology for Sectoral Cybersecurity Assessments,https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnauthorisedCodeDisclosure,Unauthorised Code Disclosure,Something that acts as or causes Unauthorised Code Disclosure,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ENISA Methodology for Sectoral Cybersecurity Assessments,https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnauthorisedCodeModification,Unauthorised Code Modification,Something that acts as or causes Unauthorised Code Modification,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ENISA Methodology for Sectoral Cybersecurity Assessments,https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnauthorisedDataAccess,Unauthorised Data Access,Something that acts as or causes Unauthorised Data Access,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnauthorisedDataDisclosure,Unauthorised Data Disclosure,Something that acts as or causes Unauthorised Data Disclosure,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnauthorisedDataModification,Unauthorised Data Modification,Something that acts as or causes Unauthorised Data Modification,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnauthorisedInformationDisclosure,Unauthorised Information Disclosure,Something that acts as or causes Unauthorised Information Disclosure,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnauthorisedReidentification,Unauthorised Re-Identification,Something that acts as or causes Unauthorised Re-Identification,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,,2022-08-19,2024-08-16,accepted,Georg P. Krog,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnauthorisedResourceUse,Unauthorised Resource Use,Something that acts as or causes Unauthorised Resource Use,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnauthorisedSystemAccess,Unauthorised System Access,Something that acts as or causes Unauthorised System Access,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnauthorisedSystemModification,Unauthorised System Modification,Something that acts as or causes Unauthorised System Modification,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ENISA Methodology for Sectoral Cybersecurity Assessments,https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnwantedCodeDeletion,Unwanted Code Deletion,Something that acts as or causes Unwanted Code Deletion,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ENISA Methodology for Sectoral Cybersecurity Assessments,https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnwantedDataDeletion,Unwanted Data Deletion,Something that acts as or causes Unwanted Data Deletion,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -UnwantedDisclosureData,Unwanted Disclosure of Data,Something that acts as or causes Unwanted Disclosure of Data,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -Spoofing,Spoofing,Something that acts as or causes Spoofing,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -Sabotage,Sabotage,Something that acts as or causes Sabotage,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -Blackmail,Blackmail,Something that acts as or causes Blackmail,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -Coercion,Coercion,Something that acts as or causes Coercion,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ENISA Threat Taxonomy 2016,https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -Extorsion,Extorsion,Something that acts as or causes Extorsion,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ENISA Threat Taxonomy 2016,https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -Fraud,Fraud,Something that acts as or causes Fraud,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -Scam,Scam,Something that acts as or causes Scam,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -PhishingScam,Phishing Scam,Something that acts as or causes Phishing Scam,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,,"(ENISA Threat Landscape for Ransomware Attacks 2022,https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -InterceptCommunications,Intercept Communications,Something that acts as or causes Interception of Communications,risk:ExternalSecurityThreat,dpv:RiskConcept,,,,"This concept was called ""InterceptionCommunications"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,modified,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -OperationalSecurityRisk,Operational Security Risk,Risks and issues that arise during operational processes,,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -SecurityBreach,Security Breach,Something that acts as or causes Security Breach,risk:OperationalSecurityRisk,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -DataBreach,Data Breach,Something that acts as or causes Data Breach,risk:SecurityBreach,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -ConfidentialityBreach,Confidentiality Breach,Something that acts as or causes Confidentiality Breach,risk:DataBreach,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -IntegrityBreach,,,risk:DataBreach,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -AvailabilityBreach,,,risk:DataBreach,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -DataCorruption,Data Corruption,Something that acts as or causes Corruption of Data,risk:OperationalSecurityRisk,dpv:RiskConcept,,,,"This concept was called ""Corruption Data"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,modified,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -AuthorisationFailure,Authorisation Failure,Something that acts as or causes Authorisation Failure,risk:OperationalSecurityRisk,dpv:RiskConcept,,,,,"(ENISa Trust Services Security Incidents 2021,https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -Reidentification,Re-identification,Something that acts as or causes Re-identification,risk:OperationalSecurityRisk,dpv:RiskConcept,,,,Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification,,2022-08-19,2024-08-16,accepted,Harshvardhan J. Pandit,,,,,,,,,,,,,,,,,, -IdentityFraud,Identity Fraud,Something that acts as or causes Identity Fraud,risk:OperationalSecurityRisk,dpv:RiskConcept,,,,,"(ENISA Threat Taxonomy 2016,https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -IdentityTheft,Identity Theft,Something that acts as or causes Identity Theft,risk:OperationalSecurityRisk,dpv:RiskConcept,,,,,"(ENISA Threat Taxonomy 2016,https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -Spoofing,Spoofing,Something that acts as or causes Spoofing,risk:OperationalSecurityRisk,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -CompromiseAccount,Compromise Account,Something that acts as or causes a compromised account that is then used by the compromiser,risk:OperationalSecurityRisk,dpv:RiskConcept,,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -CompromiseAccountCredentials,Compromise Account Credentials,Something that acts as or causes Account Credentials to be compromised,risk:OperationalSecurityRisk,dpv:RiskConcept,,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -EquipmentFailure,Equipment Failure,Something that acts as or causes Equipment Failure,risk:OperationalSecurityRisk,dpv:RiskConcept,,,,Here equipment refers to physical equipment,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -EquipmentMalfunction,Equipment Malfunction,Something that acts as or causes Equipment Malfunction,risk:OperationalSecurityRisk,dpv:RiskConcept,,,,Here equipment refers to physical equipment,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -SystemFailure,System Failure,Something that acts as or causes System Failure,risk:OperationalSecurityRisk,dpv:RiskConcept,,,,Here system refers to both hardware and software systems,"(ENISA Threat Landscape for Ransomware Attacks 2022,https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -SystemMalfunction,System Malfunction,Something that acts as or causes System Malfunction,risk:OperationalSecurityRisk,dpv:RiskConcept,,,,Here system refers to both hardware and software systems,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -ComponentFailure,Component Failure,Something that acts as or causes Component Failure,risk:OperationalSecurityRisk,dpv:RiskConcept,,,,Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of,,,,accepted,,,,,,,,,,,,,,,,,,, -ComponentMalfunction,Component Malfunction,Something that acts as or causes Component Malfunction,risk:OperationalSecurityRisk,dpv:RiskConcept,,,,Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of,,,,accepted,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -LegalRisk,Legal Risk,Risks and issues that have their basis in legal requirements and enforcement,,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -IllegalDataProcessing,Illegal Data Processing,Something that acts as or causes Illegal Processing of Data,risk:LegalRisk,dpv:RiskConcept,,,,"This concept was called ""IllegalProcessingData"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -PublicOrderBreach,Public Order Breach,Something that acts as or causes Public Order Breach,risk:LegalRisk,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -ViolatingContractualObligation,Violation of Contractual Obligation,Something that acts as or causes Violation of Contractual Obligations,risk:LegalRisk,dpv:RiskConcept,,,,"This concept was called ""ViolationContractualObligations"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,modified,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -ViolatingLegalObligation,Violation of Legal Obligations,Something that acts as or causes Violation of Legal Obligations,risk:LegalRisk,dpv:RiskConcept,,,,"This concept was called ""ViolationRegulatoryObligations"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,modified,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -ViolatingStatutoryObligations,Violation of Statutory Obligations,Something that acts as or causes Violation of Statutory Obligations,risk:LegalRisk,dpv:RiskConcept,,,,"This concept was called ""ViolationStatutoryObligations"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,modified,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -CopyrightViolation,Copyright Violation,Something that acts as or causes Copyright Violation,risk:LegalRisk,dpv:RiskConcept,,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -ViolatingCodeOfConduct,Violating Code of Conduct,Something that acts as or causes Violation of Code of Conduct,risk:LegalRisk,dpv:RiskConcept,,,,"This concept was called ""ViolationCodeConduct"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,modified,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -ViolatingEthicsCode,Violating Ethics Code,Something that acts as or causes Violation of Ethics Code,risk:LegalRisk,dpv:RiskConcept,,,,"This concept was called ""ViolationEthicalCode"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,modified,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -ViolatingPolicy,Violating Policy,Something that acts as or causes violation of policy which can be either internal or external policy,risk:LegalRisk,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -Detriment,Detriment,Something that acts as or causes Detriment,risk:LegalRisk,dpv:RiskConcept,,,,,,2022-03-23,2024-08-16,accepted,"Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves",https://www.w3.org/2022/03/23-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -Damage,Damage,Something that acts as or causes Damage,risk:LegalRisk,dpv:RiskConcept,,,,,,2022-03-30,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/03/30-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -MaterialDamage,Material Damage,Something that acts as or causes Material Damage,risk:LegalRisk,dpv:RiskConcept,,,,The criteria for what is considered material damage is based in jurisdictional laws and norms,,2022-03-30,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/03/30-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -NonMaterialDamage,Non-Material Damage,Something that acts as or causes Non-Material Damage,risk:LegalRisk,dpv:RiskConcept,,,,The criteria for what is considered material damage is based in jurisdictional laws and norms,,2022-03-30,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/03/30-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +ExternalSecurityThreat,External Security Threat,Concepts associated with security threats that are likely to originate externally,,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +SecurityAttack,Security Attack,Something that acts as or causes an attack on security with the aim of undermining it,risk:ExternalSecurityThreat,dpv:RiskConcept,,"C,I,A",,,,,,,accepted,,,,,,,,,,,,,,,,,,, +Cryptojacking,Cryptojacking,Something that acts as or causes Cryptojacking,risk:ExternalSecurityThreat,dpv:RiskConcept,,A,,,,"(ENISA Threat Landscape 2021,https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +DenialServiceAttack,Denial of Service Attack (DoS),Something that acts as or causes Denial of Service Attack (DoS),risk:ExternalSecurityThreat,dpv:RiskConcept,,A,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +DistributedDenialServiceAttack,Distributed Denial of Service Attack (DDoS),Something that acts as or causes Distributed Denial of Service Attack (DDoS),risk:ExternalSecurityThreat,dpv:RiskConcept,,A,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +BruteForceAuthorisations,Brute Force Authorisations,Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques,risk:ExternalSecurityThreat,dpv:RiskConcept,,"C,I",,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +MaliciousCodeAttack,Malicious Code Attack,Something that acts as or causes Malicious Code Attack,risk:ExternalSecurityThreat,dpv:RiskConcept,,"C,I,A",,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +MalwareAttack,Malware Attack,Something that acts as or causes Malware Attack,risk:ExternalSecurityThreat,dpv:RiskConcept,,"C,I,A",,,,"(ENISA Methodology for Sectoral Cybersecurity Assessments,https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +SystemIntrusion,System Intrusion,Something that acts as or causes System Intrusion,risk:ExternalSecurityThreat,dpv:RiskConcept,,"C,I,A",,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnauthorisedActivity,Unauthorised Activity,Something that acts as or causes Unauthorised Activity,risk:ExternalSecurityThreat,dpv:RiskConcept,,"C,I,A",,,,,,,accepted,,,,,,,,,,,,,,,,,,, +UnauthorisedAccesstoPremises,Unauthorised Access to Premises,Something that acts as or causes Unauthorised Access to Premises,risk:ExternalSecurityThreat,dpv:RiskConcept,,"C,I,A",,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnauthorisedCodeAccess,Unauthorised Code Access,Something that acts as or causes Unauthorised Code Access,risk:ExternalSecurityThreat,dpv:RiskConcept,,"C,I",,,,"(ENISA Methodology for Sectoral Cybersecurity Assessments,https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnauthorisedCodeDisclosure,Unauthorised Code Disclosure,Something that acts as or causes Unauthorised Code Disclosure,risk:ExternalSecurityThreat,dpv:RiskConcept,,C,,,,"(ENISA Methodology for Sectoral Cybersecurity Assessments,https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnauthorisedCodeModification,Unauthorised Code Modification,Something that acts as or causes Unauthorised Code Modification,risk:ExternalSecurityThreat,dpv:RiskConcept,,I,,,,"(ENISA Methodology for Sectoral Cybersecurity Assessments,https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnauthorisedDataAccess,Unauthorised Data Access,Something that acts as or causes Unauthorised Data Access,risk:ExternalSecurityThreat,dpv:RiskConcept,,C,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnauthorisedDataDisclosure,Unauthorised Data Disclosure,Something that acts as or causes Unauthorised Data Disclosure,risk:ExternalSecurityThreat,dpv:RiskConcept,,C,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnauthorisedDataModification,Unauthorised Data Modification,Something that acts as or causes Unauthorised Data Modification,risk:ExternalSecurityThreat,dpv:RiskConcept,,I,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnauthorisedInformationDisclosure,Unauthorised Information Disclosure,Something that acts as or causes Unauthorised Information Disclosure,risk:ExternalSecurityThreat,dpv:RiskConcept,,C,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnauthorisedReidentification,Unauthorised Re-Identification,Something that acts as or causes Unauthorised Re-Identification,risk:ExternalSecurityThreat,dpv:RiskConcept,,C,,,,,2022-08-19,2024-08-16,accepted,Georg P. Krog,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnauthorisedResourceUse,Unauthorised Resource Use,Something that acts as or causes Unauthorised Resource Use,risk:ExternalSecurityThreat,dpv:RiskConcept,,A,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnauthorisedSystemAccess,Unauthorised System Access,Something that acts as or causes Unauthorised System Access,risk:ExternalSecurityThreat,dpv:RiskConcept,,"C,I",,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnauthorisedSystemModification,Unauthorised System Modification,Something that acts as or causes Unauthorised System Modification,risk:ExternalSecurityThreat,dpv:RiskConcept,,I,,,,"(ENISA Methodology for Sectoral Cybersecurity Assessments,https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnwantedCodeDeletion,Unwanted Code Deletion,Something that acts as or causes Unwanted Code Deletion,risk:ExternalSecurityThreat,dpv:RiskConcept,,"I,A",,,,"(ENISA Methodology for Sectoral Cybersecurity Assessments,https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnwantedDataDeletion,Unwanted Data Deletion,Something that acts as or causes Unwanted Data Deletion,risk:ExternalSecurityThreat,dpv:RiskConcept,,"I,A",,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +UnwantedDisclosureData,Unwanted Disclosure of Data,Something that acts as or causes Unwanted Disclosure of Data,risk:ExternalSecurityThreat,dpv:RiskConcept,,C,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +Spoofing,Spoofing,Something that acts as or causes Spoofing,risk:ExternalSecurityThreat,dpv:RiskConcept,,"C,I",,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +Sabotage,Sabotage,Something that acts as or causes Sabotage,risk:ExternalSecurityThreat,dpv:RiskConcept,,"I,A",,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +Blackmail,Blackmail,Something that acts as or causes Blackmail,risk:ExternalSecurityThreat,dpv:RiskConcept,,C,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +Coercion,Coercion,Something that acts as or causes Coercion,risk:ExternalSecurityThreat,dpv:RiskConcept,,C,,,,"(ENISA Threat Taxonomy 2016,https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +Extorsion,Extorsion,Something that acts as or causes Extorsion,risk:ExternalSecurityThreat,dpv:RiskConcept,,C,,,,"(ENISA Threat Taxonomy 2016,https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +Fraud,Fraud,Something that acts as or causes Fraud,risk:ExternalSecurityThreat,dpv:RiskConcept,,C,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +Scam,Scam,Something that acts as or causes Scam,risk:ExternalSecurityThreat,dpv:RiskConcept,,C,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +PhishingScam,Phishing Scam,Something that acts as or causes Phishing Scam,risk:ExternalSecurityThreat,dpv:RiskConcept,,C,,,,"(ENISA Threat Landscape for Ransomware Attacks 2022,https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +InterceptCommunications,Intercept Communications,Something that acts as or causes Interception of Communications,risk:ExternalSecurityThreat,dpv:RiskConcept,,C,,,"This concept was called ""InterceptionCommunications"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,modified,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +OperationalSecurityRisk,Operational Security Risk,Risks and issues that arise during operational processes,,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +SecurityBreach,Security Breach,Something that acts as or causes Security Breach,risk:OperationalSecurityRisk,dpv:RiskConcept,,"C,I,A",,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +DataBreach,Data Breach,Something that acts as or causes Data Breach,risk:SecurityBreach,dpv:RiskConcept,,"C,I,A",,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +ConfidentialityBreach,Confidentiality Breach,Something that acts as or causes Confidentiality Breach,risk:DataBreach,dpv:RiskConcept,,C,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +IntegrityBreach,,,risk:DataBreach,dpv:RiskConcept,,I,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +AvailabilityBreach,,,risk:DataBreach,dpv:RiskConcept,,A,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +DataCorruption,Data Corruption,Something that acts as or causes Corruption of Data,risk:OperationalSecurityRisk,dpv:RiskConcept,,I,,,"This concept was called ""Corruption Data"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,modified,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +AuthorisationFailure,Authorisation Failure,Something that acts as or causes Authorisation Failure,risk:OperationalSecurityRisk,dpv:RiskConcept,,"C,I",,,,"(ENISa Trust Services Security Incidents 2021,https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +Reidentification,Re-identification,Something that acts as or causes Re-identification,risk:OperationalSecurityRisk,dpv:RiskConcept,,C,,,Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification,,2022-08-19,2024-08-16,accepted,Harshvardhan J. Pandit,,,,,,,,,,,,,,,,,, +IdentityFraud,Identity Fraud,Something that acts as or causes Identity Fraud,risk:OperationalSecurityRisk,dpv:RiskConcept,,C,,,,"(ENISA Threat Taxonomy 2016,https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +IdentityTheft,Identity Theft,Something that acts as or causes Identity Theft,risk:OperationalSecurityRisk,dpv:RiskConcept,,C,,,,"(ENISA Threat Taxonomy 2016,https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +Spoofing,Spoofing,Something that acts as or causes Spoofing,risk:OperationalSecurityRisk,dpv:RiskConcept,,"C,I",,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +CompromiseAccount,Compromise Account,Something that acts as or causes a compromised account that is then used by the compromiser,risk:OperationalSecurityRisk,dpv:RiskConcept,,"C,I,A",,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +CompromiseAccountCredentials,Compromise Account Credentials,Something that acts as or causes Account Credentials to be compromised,risk:OperationalSecurityRisk,dpv:RiskConcept,,C,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +EquipmentFailure,Equipment Failure,Something that acts as or causes Equipment Failure,risk:OperationalSecurityRisk,dpv:RiskConcept,,A,,,Here equipment refers to physical equipment,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +EquipmentMalfunction,Equipment Malfunction,Something that acts as or causes Equipment Malfunction,risk:OperationalSecurityRisk,dpv:RiskConcept,,A,,,Here equipment refers to physical equipment,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +SystemFailure,System Failure,Something that acts as or causes System Failure,risk:OperationalSecurityRisk,dpv:RiskConcept,,A,,,Here system refers to both hardware and software systems,"(ENISA Threat Landscape for Ransomware Attacks 2022,https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +SystemMalfunction,System Malfunction,Something that acts as or causes System Malfunction,risk:OperationalSecurityRisk,dpv:RiskConcept,,A,,,Here system refers to both hardware and software systems,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +ComponentFailure,Component Failure,Something that acts as or causes Component Failure,risk:OperationalSecurityRisk,dpv:RiskConcept,,A,,,Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of,,,,accepted,,,,,,,,,,,,,,,,,,, +ComponentMalfunction,Component Malfunction,Something that acts as or causes Component Malfunction,risk:OperationalSecurityRisk,dpv:RiskConcept,,A,,,Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of,,,,accepted,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +LegalRisk,Legal Risk,Risks and issues that have their basis in legal requirements and enforcement,,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +IllegalDataProcessing,Illegal Data Processing,Something that acts as or causes Illegal Processing of Data,risk:LegalRisk,dpv:RiskConcept,,,,,"This concept was called ""IllegalProcessingData"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +PublicOrderBreach,Public Order Breach,Something that acts as or causes Public Order Breach,risk:LegalRisk,dpv:RiskConcept,,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +ViolatingContractualObligation,Violation of Contractual Obligation,Something that acts as or causes Violation of Contractual Obligations,risk:LegalRisk,dpv:RiskConcept,,,,,"This concept was called ""ViolationContractualObligations"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,modified,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +ViolatingLegalObligation,Violation of Legal Obligations,Something that acts as or causes Violation of Legal Obligations,risk:LegalRisk,dpv:RiskConcept,,,,,"This concept was called ""ViolationRegulatoryObligations"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,modified,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +ViolatingStatutoryObligations,Violation of Statutory Obligations,Something that acts as or causes Violation of Statutory Obligations,risk:LegalRisk,dpv:RiskConcept,,,,,"This concept was called ""ViolationStatutoryObligations"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,modified,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +CopyrightViolation,Copyright Violation,Something that acts as or causes Copyright Violation,risk:LegalRisk,dpv:RiskConcept,,,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +ViolatingCodeOfConduct,Violating Code of Conduct,Something that acts as or causes Violation of Code of Conduct,risk:LegalRisk,dpv:RiskConcept,,,,,"This concept was called ""ViolationCodeConduct"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,modified,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +ViolatingEthicsCode,Violating Ethics Code,Something that acts as or causes Violation of Ethics Code,risk:LegalRisk,dpv:RiskConcept,,,,,"This concept was called ""ViolationEthicalCode"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,modified,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +ViolatingPolicy,Violating Policy,Something that acts as or causes violation of policy which can be either internal or external policy,risk:LegalRisk,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +Detriment,Detriment,Something that acts as or causes Detriment,risk:LegalRisk,dpv:RiskConcept,,,,,,,2022-03-23,2024-08-16,accepted,"Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves",https://www.w3.org/2022/03/23-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +Damage,Damage,Something that acts as or causes Damage,risk:LegalRisk,dpv:RiskConcept,,,,,,,2022-03-30,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/03/30-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +MaterialDamage,Material Damage,Something that acts as or causes Material Damage,risk:LegalRisk,dpv:RiskConcept,,,,,The criteria for what is considered material damage is based in jurisdictional laws and norms,,2022-03-30,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/03/30-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +NonMaterialDamage,Non-Material Damage,Something that acts as or causes Non-Material Damage,risk:LegalRisk,dpv:RiskConcept,,,,,The criteria for what is considered material damage is based in jurisdictional laws and norms,,2022-03-30,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/03/30-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -ReputationalRisk,Reputational Risk,Risks and issues that affect the reputation of the organisation,,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -LoseCredibility,Lose of Credibility,Something that acts as or causes Loss of Credibility,risk:ReputationalRisk,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -LoseCustomerConfidence,Lose of Customer Confidence,Something that acts as or causes Loss of Customer Confidence,risk:ReputationalRisk,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -LoseGoodwill,Lose of Goodwill,Something that acts as or causes Loss of Goodwill,risk:ReputationalRisk,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -LoseNegotiatingCapacity,Lose of Negotiating Capacity,Something that acts as or causes Loss of Negotiating Capacity,risk:ReputationalRisk,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -LoseOpportunity,Lose of Opportunity,Something that acts as or causes Loss of Opportunity,risk:ReputationalRisk,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -LoseReputation,Lose of Reputation,Something that acts as or causes Loss of Reputation,risk:ReputationalRisk,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -LoseTrust,Lose of Trust,Something that acts as or causes Loss of Trust,risk:ReputationalRisk,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -SocietalRisk,Societal Risk,Risks and issues that affect or have the potential to affect society at large or specific groups in society,,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -Discrimination,Discrimination,Something that acts as or causes Discrimination,risk:SocietalRisk,dpv:RiskConcept,,,,,,2022-08-19,2024-08-16,accepted,Georg P. Krog,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -ExposureToHarmfulSpeech,Exposure to Harmful Speech,Something that acts as or causes Harmful Speech,risk:SocietalRisk,dpv:RiskConcept,,,,"This concept was called ""HarmfulSpeech"" in DPV 2.0","(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -PersonalSafetyEndangerment,Personal Safety Endangerment,Something that acts as or causes Personal Safety Endangerment,risk:SocietalRisk,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -SocialDisadvantage,Social Disadvantage,Something that acts as or causes Social Disadvantage,risk:SocietalRisk,dpv:RiskConcept,,,,,,2022-08-19,2024-08-16,accepted,Georg P. Krog,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -SocietalHealthSafety,Societal Health & Safety ,,risk:SocietalRisk,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -Terrorism,Terrorism,Something that acts as or causes Terrorism,risk:SocietalRisk,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -RightsImpact,Impact to Rights,Something that acts as or causes Impact to Rights,"risk:SocietalRisk,dpv:Impact",dpv:RiskConcept,,,,"This concept was called ""ImpactToRights"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -RightsViolation,Violation of Rights,Something that acts as or causes Violation of Rights,risk:SocietalRisk,dpv:RiskConcept,,,,"This concept was called ""ViolationOfRights"" in DPV 2.0",,2022-08-18,2024-08-16,accepted,"Georg P. Krog, Harshvardhan J. Pandit",https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -RightsExercisePrevention,Prevent Exercising of Rights,Something that acts as or causes Prevent Exercising of Rights,risk:SocietalRisk,dpv:RiskConcept,,,,"This concept was called ""PreventExercisingOfRights"" in DPV 2.0",,2022-08-18,2024-08-16,accepted,"Georg P. Krog, Harshvardhan J. Pandit",https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -RightsLimitation,Limitation of Rights,Something that acts as or causes Limitation of Rights,risk:SocietalRisk,dpv:RiskConcept,,,,"This concept was called ""LimitationOfRights"" in DPV 2.0",,2022-08-18,2024-08-16,accepted,"Georg P. Krog, Harshvardhan J. Pandit",https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -IndividualRisk,Individual Risk,Risks and issues that affect or have the potential to affect specific individuals,,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -Harm,Harm,Something that acts as or causes Harm to humans,risk:IndividualRisk,dpv:RiskConcept,,,,This concept refers to the general abstract notion of harm,,2022-08-13,2024-08-16,accepted,Harshvardhan J. Pandit,,,,,,,,,,,,,,,,,, -PhysicalHarm,Physical Harm,,risk:IndividualRisk,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -Injury,Injury,Something that acts as or causes Injury,risk:IndividualRisk,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -ViolenceAgainstChildren,Violence against children,Something that acts as or causes Child Violence,risk:IndividualRisk,dpv:RiskConcept,,,,"This concept was called ""ChildViolence"" in DPV 2.0","(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -PhysicalAssault,Physical Assault,Something that acts as or causes Physical Assault,risk:IndividualRisk,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -PsychologicalHarm,Psychological Harm,Something that acts as or causes Psychological Harm,risk:IndividualRisk,dpv:RiskConcept,,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -SexualViolence,Sexual Violence,Something that acts as or causes Sexual Violence,risk:IndividualRisk,dpv:RiskConcept,,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -IndividualHealthSafety,Individual Health & Safety,,risk:IndividualRisk,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -Privacy,Privacy,,risk:IndividualRisk,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -EnvironmentalRisk,Environmental Risk,Risks and issues that have their origin in environment or can affect the environment at large,,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -FinancialImpact,Financial Impact,Things that cause or have the potential to impact financial resources,,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -Benefit,Benefit,Something that acts as or causes benefits,risk:FinancialImpact,dpv:RiskConcept,,,,,,2022-03-23,2024-08-16,accepted,"Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres",https://www.w3.org/2022/03/23-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -Compensation,Compensation,Something that acts as or provides compensation - which can be monetary and financial or in other forms,risk:FinancialImpact,dpv:RiskConcept,,,,,,2024-04-14,2024-08-16,accepted,"Georg P. Krog, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, -Reward,Reward,Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee,risk:FinancialImpact,dpv:RiskConcept,,,,,,2024-04-14,2024-08-16,accepted,"Georg P. Krog, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, -Payment,Payment,Something that acts as or provides payment e.g. to access a service or purchase resources,risk:FinancialImpact,dpv:RiskConcept,,,,,,2024-04-14,2024-08-16,accepted,"Georg P. Krog, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, -Fee,Fee,Something that acts as or provides fees e.g. for using a service,risk:FinancialImpact,dpv:RiskConcept,,,,,DGA 2.10,2024-04-14,2024-08-16,modified,"Georg P. Krog, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, -Renumeration,Remuneration,Something that acts as or provides renumeration which is in monetary or financial form,risk:FinancialImpact,dpv:RiskConcept,,,,,,2024-04-14,2024-08-16,accepted,"Georg P. Krog, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, -FinancialLoss,Financial Loss,Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity,risk:FinancialImpact,dpv:RiskConcept,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, -JudicialPenalty,Judicial Penalty,Something that involves or causes judicial penalties to be paid,risk:FinancialImpact,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -JudicialCosts,Judicial Costs,Something that involves or causes judicial costs to be paid,risk:FinancialImpact,dpv:RiskConcept,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +ReputationalRisk,Reputational Risk,Risks and issues that affect the reputation of the organisation,,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +LoseCredibility,Lose of Credibility,Something that acts as or causes Loss of Credibility,risk:ReputationalRisk,dpv:RiskConcept,,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +LoseCustomerConfidence,Lose of Customer Confidence,Something that acts as or causes Loss of Customer Confidence,risk:ReputationalRisk,dpv:RiskConcept,,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +LoseGoodwill,Lose of Goodwill,Something that acts as or causes Loss of Goodwill,risk:ReputationalRisk,dpv:RiskConcept,,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +LoseNegotiatingCapacity,Lose of Negotiating Capacity,Something that acts as or causes Loss of Negotiating Capacity,risk:ReputationalRisk,dpv:RiskConcept,,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +LoseOpportunity,Lose of Opportunity,Something that acts as or causes Loss of Opportunity,risk:ReputationalRisk,dpv:RiskConcept,,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +LoseReputation,Lose of Reputation,Something that acts as or causes Loss of Reputation,risk:ReputationalRisk,dpv:RiskConcept,,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +LoseTrust,Lose of Trust,Something that acts as or causes Loss of Trust,risk:ReputationalRisk,dpv:RiskConcept,,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +SocietalRisk,Societal Risk,Risks and issues that affect or have the potential to affect society at large or specific groups in society,,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +Discrimination,Discrimination,Something that acts as or causes Discrimination,risk:SocietalRisk,dpv:RiskConcept,,,,,,,2022-08-19,2024-08-16,accepted,Georg P. Krog,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +ExposureToHarmfulSpeech,Exposure to Harmful Speech,Something that acts as or causes Harmful Speech,risk:SocietalRisk,dpv:RiskConcept,,,,,"This concept was called ""HarmfulSpeech"" in DPV 2.0","(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +PersonalSafetyEndangerment,Personal Safety Endangerment,Something that acts as or causes Personal Safety Endangerment,risk:SocietalRisk,dpv:RiskConcept,,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +SocialDisadvantage,Social Disadvantage,Something that acts as or causes Social Disadvantage,risk:SocietalRisk,dpv:RiskConcept,,,,,,,2022-08-19,2024-08-16,accepted,Georg P. Krog,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +SocietalHealthSafety,Societal Health & Safety ,,risk:SocietalRisk,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +Terrorism,Terrorism,Something that acts as or causes Terrorism,risk:SocietalRisk,dpv:RiskConcept,,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +RightsImpact,Impact to Rights,Something that acts as or causes Impact to Rights,"risk:SocietalRisk,dpv:Impact",dpv:RiskConcept,,,,,"This concept was called ""ImpactToRights"" in DPV 2.0","(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +RightsViolation,Violation of Rights,Something that acts as or causes Violation of Rights,risk:SocietalRisk,dpv:RiskConcept,,,,,"This concept was called ""ViolationOfRights"" in DPV 2.0",,2022-08-18,2024-08-16,accepted,"Georg P. Krog, Harshvardhan J. Pandit",https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +RightsExercisePrevention,Prevent Exercising of Rights,Something that acts as or causes Prevent Exercising of Rights,risk:SocietalRisk,dpv:RiskConcept,,,,,"This concept was called ""PreventExercisingOfRights"" in DPV 2.0",,2022-08-18,2024-08-16,accepted,"Georg P. Krog, Harshvardhan J. Pandit",https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +RightsLimitation,Limitation of Rights,Something that acts as or causes Limitation of Rights,risk:SocietalRisk,dpv:RiskConcept,,,,,"This concept was called ""LimitationOfRights"" in DPV 2.0",,2022-08-18,2024-08-16,accepted,"Georg P. Krog, Harshvardhan J. Pandit",https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +IndividualRisk,Individual Risk,Risks and issues that affect or have the potential to affect specific individuals,,,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +Harm,Harm,Something that acts as or causes Harm to humans,risk:IndividualRisk,dpv:RiskConcept,,,,,This concept refers to the general abstract notion of harm,,2022-08-13,2024-08-16,accepted,Harshvardhan J. Pandit,,,,,,,,,,,,,,,,,, +PhysicalHarm,Physical Harm,,risk:IndividualRisk,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +Injury,Injury,Something that acts as or causes Injury,risk:IndividualRisk,dpv:RiskConcept,,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +ViolenceAgainstChildren,Violence against children,Something that acts as or causes Child Violence,risk:IndividualRisk,dpv:RiskConcept,,,,,"This concept was called ""ChildViolence"" in DPV 2.0","(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +PhysicalAssault,Physical Assault,Something that acts as or causes Physical Assault,risk:IndividualRisk,dpv:RiskConcept,,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +PsychologicalHarm,Psychological Harm,Something that acts as or causes Psychological Harm,risk:IndividualRisk,dpv:RiskConcept,,,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +SexualViolence,Sexual Violence,Something that acts as or causes Sexual Violence,risk:IndividualRisk,dpv:RiskConcept,,,,,,"(ENISA Reference Incident Classification Taxonomy 2018,https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +IndividualHealthSafety,Individual Health & Safety,,risk:IndividualRisk,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +Privacy,Privacy,,risk:IndividualRisk,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +EnvironmentalRisk,Environmental Risk,Risks and issues that have their origin in environment or can affect the environment at large,,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +FinancialImpact,Financial Impact,Things that cause or have the potential to impact financial resources,,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +Benefit,Benefit,Something that acts as or causes benefits,risk:FinancialImpact,dpv:RiskConcept,,,,,,,2022-03-23,2024-08-16,accepted,"Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres",https://www.w3.org/2022/03/23-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +Compensation,Compensation,Something that acts as or provides compensation - which can be monetary and financial or in other forms,risk:FinancialImpact,dpv:RiskConcept,,,,,,,2024-04-14,2024-08-16,accepted,"Georg P. Krog, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, +Reward,Reward,Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee,risk:FinancialImpact,dpv:RiskConcept,,,,,,,2024-04-14,2024-08-16,accepted,"Georg P. Krog, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, +Payment,Payment,Something that acts as or provides payment e.g. to access a service or purchase resources,risk:FinancialImpact,dpv:RiskConcept,,,,,,,2024-04-14,2024-08-16,accepted,"Georg P. Krog, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, +Fee,Fee,Something that acts as or provides fees e.g. for using a service,risk:FinancialImpact,dpv:RiskConcept,,,,,,DGA 2.10,2024-04-14,2024-08-16,modified,"Georg P. Krog, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, +Renumeration,Remuneration,Something that acts as or provides renumeration which is in monetary or financial form,risk:FinancialImpact,dpv:RiskConcept,,,,,,,2024-04-14,2024-08-16,accepted,"Georg P. Krog, Harshvardhan J. Pandit",,,,,,,,,,,,,,,,,, +FinancialLoss,Financial Loss,Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity,risk:FinancialImpact,dpv:RiskConcept,,,,,,"(ISO/IEC 27005:2018,https://www.iso.org/standard/75281.html)",2022-08-17,2024-08-16,accepted,Harshvardhan J. Pandit,https://www.w3.org/2022/08/17-dpvcg-minutes.html,,,,,,,,,,,,,,,,, +JudicialPenalty,Judicial Penalty,Something that involves or causes judicial penalties to be paid,risk:FinancialImpact,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +JudicialCosts,Judicial Costs,Something that involves or causes judicial costs to be paid,risk:FinancialImpact,dpv:RiskConcept,,,,,,,,,accepted,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, -,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, diff --git a/code/vocab_csv/risk.xlsx b/code/vocab_csv/risk.xlsx index c408e0da49c5fa824c13a98422d2f4ef795e3252..98b8bba5684c0ca1468644d8662b6a9c32b59edc 100644 GIT binary patch delta 117521 zcmeFZcRbbo|398&ugEH)K~iSxNFho>sg#i|rR=@OD+*UhTAU(DQHf*EjAIl@h_YqR z>~YL9zRzJsAp`FwuA>wUZW;~K~7oagKLe2n|!{ur-UZ8uwW`ewQ_ilpn9*HBVY zu2DF!;enMH^8+EO_3@%SB&0umPIM(%@Q1>+3;w{gZowb4$^QO_z-}_KLdkQ?ESiO;gv&i^p62x%rZw

+ zKe(gWB=_3+A0@Lb@)Hw<;e?|I7>;xhyM7BJjtr}g%e}lGb&H6d5jc}isRTIY7V(FoqSfxpWw)JQwkFb;U@FBu~RK@ zT_kSuODIwUGyF{rnjHG#z>S;6oW^0gV!wY6#)-M2d~~6i@mEOqnf$^~N%RyHg~JT> zs^PkXan+$%)G!=3g&O3RM34KNrkL!hmV!_dP3|*OQb_D{^&l48QfL8T+6qIZ&|^K& zRDGeYJ9<3zG!6yFf$O2r)KI@J#68x=pc~tiRquvrOKrl9Rl>KUyMz_*3=dmCGuRA< z^1?yvaGOu4`;7HnT}To=)Nc{`64%>=1X6HG;>HR3%nZ*Ax=&5^79ug@g@cmVNwJDo z8(k+*J`gm~GC{@pgbFkH?fyp0WWO+O)ISv0_GK%C-RFy&#`+9GGfhoh`?)$pA?$Z< zBzi2=-vC`G=2vEb9sSaa>ym=dx#Tz(RDx-vwWz-?HxyEfb4kYF9KtIzV%2sJo)K>P zo~$m3ut0M7kF_P_-RDGEI=YpTJ=znk4h9p{Xy`ZD~!oa#vi7F0vGh@hLMx>vBtB%erv)v8d5!NOVt^ z1q4kG`9N?fXj)!!S1Z(o>qzyN0@CeI9m;2rLQh5MVJf+^F$1ZCxT%)${;rY9Sbrdt z;lidXLoVOY<3-r<;zC?k{^`&wqrE=dlCBd6Rk#hf3f0}HF-V|}RAC%?YJ$|wIY3y> zN&HiEp?)ZCYP1g}RW=w<9ZXK%2;~g(BDsXi(M{tOZlf+(XqwS=!e3X)Puy+N`n}XC zY%Di+ykE+FQV>0PbOr;AXNFG`XO+4!YjQGH)N!T|Gd`;5HZcs$3WxK5QR|_LX(=3p zrbj}Xurm`lbTu4z*$v&+GQ?hFP~|V$YxT(xRrRRE;FICzMCXaZN~p6^bf)kT2IrHG zXsq4f4D$nj6|SA`&_KKUy#NL?E(}d~v>~xW#e>(SbQ4i6{`Il#&mrgdGSN<(O>WsS zg{Kcrcg4D6+HvUO3@JBESy`dmyLJALN{R&xI|^?2Kl+w&;ZvR8&2BLc*p3v@-V2|6 zIY#~bYCl~}F+X_`>T3JsL<@%a7gL6CN$;)i+9XF)fRj@4Rv4+ zHyYfXAWhf1JFy|X?%7m;mXp+d4$KMF#&))UI!Ptg*W3XqO!9mx4!la8Xyb?c zTvHF-ez|8p?d%XC z6M6p4L*t0!kt*LGI!8zsvB#|uSm&E_QRKwh2V!j1@?#~Bx`Uex4$Mr&e#)9C=5t)f zsY638`eBBSCAZjZ*E(nrb}{q9U6lWJ&R5~w{t}&;@4~k|K7o~`Pjtm?i^9NRdHt_& zGcR!V&0eNbkjPLYZF55e*HB?g$n+_tF(JOQe?8n5a6+)+ucU1uCxrL>#r}eMr+v#i}w#6L=Ek!%J(%Kezguo_>t$*A%oFmr_d@K7G8dKao#cV; z-FJ+ilFTOkOG}3}ljQalDJ+&Pz1Wrdo^m)-r0k}9s^J@YWXTx~9@cRVC;$+ zSid%lGttF&V^7D~oU@I5BbH~+Cuu+YR!>%&70}0ZMZ_?baGdObzD5OmU#%3H1ee~f zkyGtLqx{Dd?kR+`LPp0l?kR<{Z9I1SEcHW~h!gy(6`{%Uo$Z$<%s&lqUTV(>z&+-C zQH7PWzcV5gKgfD{!d%*ZkSC*X zq3!fq43Si~h7E08wBn~G*h3`?oT2`Yk*wPyPVg%G?%Req!B+wK(rzo*Nv05{9L~Jk zXw&0MN=hw#g?Y6{Hz8eyrN;Uqd34YW5}P|BT#m)Q_Da+}Bj&>YWVptl<;2Nd_iwhl zs${~_MzQ^QR!8G3o0G#WcNPdg!Q9WgcTSLazD16=Z%@&aCwT|&c-f#w9zZB$&9IQ; z5YH!a=2G}PU|$>w^;nKl?Y6&~xLw(Frn zghHgM@k5OWrAW0+4{wvu>~BD_DbhaNm2$j+YbHsh{3(Le}K- z={Fuy8UuGMzR3@rtY{)X)wG4raWX_VkdO26uFDGP5&X4f40TG#D~-FgxyGDNb(dQ( zX!O4{_-3c$r5t&lzf!?ZIqEAvO5yr_Q9TlMN>-2edUrSNu=*r;>q3+HWoX@~KjmQf zPF63k(|O?@sT!)xmiq*$jiPwKO>jGGEAB-qzkDclH5uy4hORm6FZECB9}Zwp)uDAy z$m`vbd`ud9W%tu`*S8fmLQ9@6Y41$~^W0Nr>6M!l+usX|(brFt73yQv)OTOaJDZzZ zp442WVQK5QQ*0ytNK@Cto2%S&5p2v)IP%Hls->y#c!oDyc4|PD)}>3I$sT{Ev`C4x zx|%IrhxR-9w24gB6zY$}GfYG0Ey1DE{Gd)ME-q@N<1ZB+D`zKU*1yM;_nTG>*}Mo{cv*J4-!5y9fn1F=rlhOdxTR=03LTNQ5CofqiXR?~-Sa&pK9 zv6CO^bj}s`%NG05BS#q^qWoe_+sa*_`st4Ggl7#6>_V`&^vdSUJRRP9tF0gWPH^d` z=*lYt8}HqLuxyT}^U%UWB7I-@6p+o&zR8nO$bIpwpT6?6xuwN~jwrs5<1$$jFkJAk zTthEeSAk`2x!qmQ7hCwno}{xrd14cGewT_uvhs_syX+LQDxO`URbRvEDXS;S9v&jU z*@njadwGn#`Zg0}v)CtHn{l2`x)%-d8+VC`1+hX6rBb8o7#PU-wx5eQ$*_53pf6QyY^tum+Hv1GE+U%VL{>RolvN>>{qgq9f;?U3;%eo1G=pz(PCOgol z$+{{%8=+XXd{j#KjIXq^h3_=dxnOByu*DlgYW{h1iW4OW_oGGnBXqnzMX-m=aMORm-np?Gr^gOV7G*+Z{b{z}Z=2O0{uVtlue4gJWdeDjNs=L9JcW5NX z(nZlbj#Wz=-}G!hMR_G=Q08}5o#kStfrxkafp}YyG!j&!OJ5O-Mg4Kus&hCPUcfBJ>dUh3$odxI2( z%!?G()86;gOkp}!mVRbez^(|5$g{=);t@JVXZDZ_tf9%>7ROFoQOa{CoeY*C&B3~U zb5jwfmbs(pBe(U#hL9}Njg*`xqfWs+np-BYu%|?no7%*7t`7qtPnPwP6(7lDk4fPz zJ|c4BjaluU^%9Hv>JL{{txux8l$8tP!D-I$>0?vJ!Kp0z&1y6WzVqes7Dq=%7w{iE zCN!R@8^8=YmJ;tGBnI5nl9`9hXK%G9_y(j9p&W63_kIP0@~f}A=@bgCk?Cz!U&ne~ zy6*8i(bVRbm$#UxOASRHvv<$6s%Zo`cW9C<)pRQ*=P4Q`HqYjkux8t>e*rj+wL18| z5tlNSsS~&Uoo|b$X2SY)0Q3R{*Oe~^1`rWOX{4(hUrhUE=C^1MViEUS9*8*kXr`>c zk(bmwhIKrA*fsoXMrXjD2(+|$uqm$8LNT_`rAs#w2J`Nvb3dkG!OVjiPZP0t7~J?c zb}202!DB(OnFe`6WBH+q#zD%%RHKKWwLo-tuF<(fH8fw#X=~M{Y z$=WAdvXE0|Jt)u1TXblvIkYJvVbu4X^B}IcwwA z3#|3c-O_)u^^vCKmpyk;@J^If<1UGAZcG14>Qak>>sS(i-{UE!ER@F~-M;F5B{+$Nk)J=7qRN!1%H*!v%KaZb8-obTC^U z9U!Yuh!i8yBJ!#&o7G&9bt2!J)i{n%rCzIho%+VCNa4O;(%6Q>=tiUjI-C$8nuZjZ zaBN?l67_g*vgKE%T;io7mroYdlz-l(wKG5=KpF9MXR<!XPt_l%IMCPZJ>}QWr|)jyl4#0H!BbAe?+?9+ z&=mLMGLDIj>$EHspPq~BmL{8XC62>cYq)gRlnGy>V9(h=+ssHlL`&-U7s=uG*SHLh zl!-p0*!cMYZTDI7F#%HNN4Z~KZ8Uvp#}mx9Gc`GM%7gAu<|bB2st3q#fr#y4B7&)G zf-rGD%uAxWuv?G~=*v7D8CRjUWNRCPw1#Heq=ua*KK5Ten_je$ZAtU1z=Kl5OBEgt z4cUZo?lEQo8k*1>Q)c}o2`W6yFFRgFov>sbvQk#Nw-b;qau0Bm)*}Pcw-e+Iq^qyV!@plv7 zgAe6&vD=16$AR750(R%DnQ#k$USl9)+p?fX#Js2z2V9~d9^`O}fPgF04qYW7&Eqn7 z>SK~CsCoQ3!P;IqaiU*c3*kN+3lHYV?>Md|{n5`eyrEA#5ccs@Y1)#(=srFebsP{B zsQs*bH(5YIhZV033qH7@K-deT^qxGX!-pRR3kjTsK!O>>_ORabGOrFTy#D@WUUr_2 z6w?bgpIR-6HgiC#nh@r-#RRH!k0Tx+P(V`^9Kia^WnM?eoiJ@xJOBjq6)T|aw1UZs z6*Ad{(s+v%L{3nf*CxzbGPHQ|isz$}CUzRCBO?(U15j=Y+ml&~8l@SyT>FuU`U_u- zq>lBt9Tk@jjS>L^uv-RunQ&8HU2GY*+X9?NFUB=?%Y`#oMQlMf_IWvFHH_V+`313| zImqt8L$>*sxA);J0l`q}RlWQM@sUARy3oxfxZeKDwH4r&)|y7?3FER6;7cr36EW(~}Y-fEWunIJ38^6AYVHGO{> z_X4RW>U<$335316Dh)GRg)?S*fR#Pf;ue-2m3xHq?urd}y>O`VJxh0iC7Jt8tMP|g zX0So@rW-{jbTMp|&$NOT40APYoV)tuDO-l6!wRl*Fr5v1wm*P%}TC%1JA?6?B6 zJ>rh}+k3__3y>D)mg)`W3hAlEanx`|ui2fuD{fOXiAk<_9GB^uz1|{QXsP%&oIH7= zNRNr_+u@KZqs+{jCsyvglOfT7jlkSa=e3u#l3BYJJ*Q=VbTanfRjeJSz3*)M=_bPY(`y}JIhBKNPCUgh`F?krG_!jHJ@4=dlhba^BkALG(b6?3Ktt8c;P z4FX)alMbjhr%h^-#kz+an@<&=db;pcc#M0Iywt1)5}%vT7%>smO)X# zu@Wo|R549Ga8+kZ0?ns{xFPvRQ0RO6+5~FxpuqYnsnK^8nouM$D^9iNzcEw(RTu8! z{w_<$(wvqJ+N@2%FGhXe6Hn=j4ld0+X44@%7R?5$Jfu9IBU7ivNe_KZ9L>Y4#l5>g zrek_i|9U4GMX#vd1+P0NL9*gn%yDkA$E{JQ=20FYBN8Pem(LZfe?E3AGtmYk3-<9^^!WgSd=Xl54?<%9tG*B=$%j0})6NqxoFbdTo^2kek?{a%?lf|!ec|(@Yjm+y_&|nGh zE(#i9Z(qwIdRBHG*)&rMnyh_GmrHJeatVLlw z?qqfgf*g9BQuWMkvE|FAT{5F4muD2x41PX`PD_E4tQg`{ZSE*cvf~kwxljHPlJ#~z zdcQ!qd2K7Rco1utf~xbC()DX6_07Lie! zeFj>poRRPzfS}zT!F{!6B6RH~xAKYq7}v^da7n7}J;oNK?i{6L8+KE9y!~N{d&q|m zi4jgAl%QUFJmf>Ug~Bqei4Uy!z*LkZa|sp$y^JFz1qJ;&KNBW__X#(g^vhzPv+n!dwBMCVuqpzv7g6iGuo&xxHqQ7=}L{vWum{2iVW(m%CiXred|jimx|L zChzWYJ@>XZX(3yfzta{fKo){~zT|mv#%vve+0mLl3eI;y#vj%9d4V+d(6vF1NQLA~ zla{!r@0EH?FBO3_$2@x|@wmDU$KzQqJsB(*;y{yfedr=I8QaNQFRgbMU730H5M`Fg z(guysOF*t#nMV(^bnHsC1m-OG1mt!!SA3#alNtg|DFAB_PBmgZm(^3nfG_>zBe>C0 zTBYOrbrA?MO{vcj<#iefsOwqI7GDFwe(;47XtAp4rP*@Av$*_@wJwne((DKFX3{lh z4}5hQ2~yTjO!0{;41x!mzO<}(eV*TCk1(#_wcI0JGb|z}FXNt}CcTeBh+!;$%*J8a+5Tp!@_7$W` zFE5-Vd!@+mFoEw2-2cw$K(0v#(m_@MiJ^;Wt(F=ZR*J0LLk-F8w!YkdTf^ zn$$b(H;p(fX~5tH^}RS8m8xiU~L z7p}zV#+Byy=6bdn$>+9ojL_Wa5+ZxW_G-x_jHwK`5E%@yujbqrD6wghOpf7mO}jMBiqOHHv*kux8O*_A&Nrx-26Qt^N-9U_s=q^R> z+hGrfGtutG*@X~=fhoEkHcrEJyXC!Q^6*6(Ct=Nm46m$ki?6|w>_?YuFXA&aKrZR^ z{T0{V!HTcr0H4ZreLy2g*C$8#4TytONzDf|EZbUMc|O2fiM43^mo{(e(x#JRnN4Ev z-x2ET!_XT#elbdr^a|_}OJ4@fiJcH5>3lASP_bzS-9&vI-YEuM7p5J9mXpslEaU9F zSQ~s<8yqJin|bhU(-Df2L&Yu`Ht$Xh1_&`YXC+4O&Eo%Nr?J4lpr1NOWWYR1a7J|R zxmeeHDCko3l%W=%45mNs(%>$04k`+|CHL9*>2w><%dc>7pmQGsO2>zS3tc`8Tz)aQ zm4>TIx>~`P)Dz8{4&&GdjgAUWYnO#DW*nS08{9P%;+v#}iesS}xz8DDo-*PU(kW1l zu;%f2-Gtk%jO{#Vr42gIl>s!ViPz`*Qz5+=PSFI)eNL{p@oLM|hq1IXN-Cz98}Pl0 z2BgA<8=Dk} z1U)6Rz0AHnN;Xc9leFZB?={bG%5lY8M@pACfv=v1eVh*kZ#UaJik)kxoZ0W#4y6X& z9xo2u+y@sp=(z5ntmWrzcY&N<)ShDm!GSZ~9YM(|ApC6ORmL-SnRBJ3rmr%7cnmQw zQtJsbP-5KtvY@>szG$Wt(=wA0StlYahyHdR1aDspF8##X0w3O)q29DhLAXaKVyvjR z09qYhN}3~Th2I_yC@fGjLCf8bf`iX73=UltaPs$Y>2fFueLn?3e%1|#pvRWB&ki(} z>b~2^9hfvsUvXL9@XI4>)fq?NlI}T@PjT#z6WvOxv%AMG4#Dt%bvx{W(!m9t zD_gn>v*!~4fR6pBVR{oG4&=QFfzrWtD{watL)&Kq%nz&Y>oh{rLA#1fH=T1b+It$9 z6hlqgC`>?%yW!<#c(rE%r}ienSYES3E~v(x!e;gSOVt+%oPH#z&fbSEutY&pL!wpE z!d=S$L76K1M5(U-M$Xr4WF5)jHV$`L74{rLL}n)0y#f^s3iB_}6s&!711tV+2Z(n& zB~H9s#qaJGWb4BwBs^s~$)hB>`64*hO>itpPH-&AZ_?uXh^Km?gwHG6;c)2m9k&v- z;$pv+5l_Vz9kSBOI>Npm6(N^vix>d01L2J?_GP~0YHlfqO)+;o^lM^qV(oIsJvb18 zG!_s)BfS2jiM;S>zUFf220>|lRwI%Wyx@-5AaMdHqyq~F=^+keYC{shUtQeKJ&eP;znR@gulZXiXPQ(xc9BX zCBm0JbJsVn_P)vR#GOk7Yx3*dZ$YyE!0K)A)KFSRC5CQbaB}P~YqgdEwA?Y!Y;TWc zc5-)hRkv?TW* z`uHRdhw{@mxiD@5nuR=da+=ig_K?y`t8-iB!NyOuKZ!t+6)>g_G|ucUF7r=Q8~iW< z=t#HtiT7vk;@C*bv}lxsPAy$J36Y2J?P(2D%W$*2YOGKZNX2o3!ysA4OdjY%fPP9( z8eI_ElfFVXJkvV&(ceU&JPUWI9sQR}RvKu!3yELh7oxu3n)lemsz<5gSNond?^}3R zN_!bWE>}b6nq1D{og$lU--ed*gq{KnB&&tHMP&x|shD5y?AU)N_@m+kui8gjy%<~f z&%NBV-`Hb##3dqmC_Ndx$McY972ZBhU()E5@J1J5bRqX1oM!S+FIib@yT3qxmz)&O21nI%xp)JVNZ*Xz zZfDny?;6GguvUBCkpi)s#uJ@&-J-4RBFfpWD1EU2`vYI0)VD7Kal_Yo+GA7PZ#bzW zjyrs$4Sio!zp;V#RAqAeQzIAZ(eInejNb^|R0v4mgXcGSpOkwln5CgjGw}H3#;bPH zcU9q-3z=uNt%Vi~y2RleJQN{fjOg-*|LWn~>4mp19`mJ?CMSb@gZLI>eX7d=G)FFjxV{acb{ z>nIY!ZT*zZL_>Kr??bC=IztWYMG02#IqB0aB4oum)+VDC?N9;RV>ez3dk=ZtTys5# zM~Wn>o+^6#)k&*7?ervS))><2A7N)YenWI?#C3VCu|4+ti)(~WsaWXJBdfV?TMagd z;TroyOECevIQEyc8b(USXg-RVei1PcJ}uUD;iaM$bzp99=XwXOwgaOlxnV+&E{i{j zMX&Wy%ksOD@f6G-eF|T!zOFqsVk=R6&M`0<$1lnLqA`n!r8Qo%<28=w@fEAaSHU#} zS=jXV$I~BYj*qskv*K4DH?_xdH;RlOzQZY%z1eJZMVuhLsdpc9Ht7VICbF(4n87aKJKyZ>1{ujxb_{mVU{Pjs-R$g-(K~-6Z2+`4ol24yH&M|3!PoO8!9}>>^_9<$eMnCgoCc_))vPiO4i-UXV z-4PV66cSFc>efw?ay>5ZpC6j&`9zaxDu#M7rBH3pdvv#=oJYu+EIpWoC%K>+t5lrJ z-o+Y(giI#|N^v9A1zFm66|1Ok$9`uHk72!*hHs`IrrviAUNLBE+?h?*OFDFg^nL0j zuN+6trd^WS+o3f}+S^lLZ?`O@c1ylBfcm8@4zjmpKCf^%dS}#vEWyfxt?9lUXI@L`?P8%MC-Y#yqYZ78_W{=4&TW!FAHvEQwB!@8G*yI^9JVajVVntNnw zyLG66dusn`!L#nk`YWvs#fDhYpSyKCtB=xz9O6ym6($xU)J;^?C(IC5@pr3JtJ zOJqm5t;kJZor2OTnrN<&vt1L2aTzXs9UEnrt-G&kK(`*~eE9yp?7O33EEXGhugI1u z@l!R&Q0|_%&3&dN7buK$tBTOPsZdLq(3fb|vEyg}GaBm`X*B{Uw69XpHRH8#2ul9E zYvM(osPWT8idxtA-cB%!Nrt%FqVyGxG)9?~`@HSnYLEwB4?$#25A|7b#k%Vn`Hvlc zo}Y|D4!`wdGr+n<96sXmB=8*V#W}o!egIaOua4*^@wzCvS2oy#4Hf}pzR&YSKPuYb z;swfDlQy&3CB8~8`6%7DF3|I`-oYBDr2g%dFgf)#nHm-8I?@i@-$|agv+j7*vqZ-f zfXC-z{#Zvt&Ynu0;@0M-_t`slZH8WCJ|CJWa$$Y-KJhh&M2VT|;fs8;J=hmnI)@d- z%XW8{9vwcy%u>*aU4HOZ0H?g7~OEx8{%ulBtn-{na5&2A^e^_OSsy~mBY)NxGFYol^E z#j!?{_U4j{7*LYt-4)q(n=0$c$gL|?j5?fQ0%OHr$j-K~cd&RNQzsL}1fR=w#U+Qg#09CIH|f2Ph8tj~ip6 zn*?8nqMl>-${L}%PYzlJF6v`=7t>L4s@!WL8OvRw{%XozY+BP>%6D{vwhKx-9k8_| z6J@MVCcXLm`mxk2=N<>F-BGvJ0r%wSoeEVHbu?22 z(?=wh#=4JqtP5z04$gilG46mJeAj&8i7VSMkNNgWpWyMMC_&@c`kh@E#R;h2hY%!k zOJ9^6dSJ|EVv%*I=(YubI{C!~2AD{P4~PuAE>&skeo2`*guB_2nnma@weJzz#4%Qj^HaJA+M zwfOY{37s#a-ns1!dJx0p;F-n@0T^p>ykcVh_LjC@A4{KMiK5!$lS>|*K*B2Qstk3d zrgKWaOXl1aN$580tKkg2EYMI(H;-XYD&59qpPZ(=_&XSbe&CpMeXqpj=!+-VFWBz2 zHi>(4={W1R z+nh5wiMPF6{%VOhz5Wq^ko5g90|v<5KAR#V=cd-m*k{#y?cV-4FeO3UWOnHu)`53k zKW#EEByFY8ZC+q*Xa-gIHO6cL7;;aR&j4m%WAjm+16HOk)=ahb9Dz|>>gx;%4FS_2 zmfHy9Af3v~tNM0G@(x%XlEAs22gh5Q^c}B*QE?8f^Waw}57e~T%R1nv^5ekJ@~Ylr zUsX~c&1<$6U=cyl*MfnfOQ`1+-EiA0<3i=iH)mIUz;JPTSGlAaZ4`<%`@fM73pG20{5tj^4u19yKy({zWd&SgBzoW$IbO^uWGpcZMt@f zt8Xoz^)jr2Kq~0*q@w0RnaOsECwfU!ca9k|-u6SJ_fXRbbGiW6BM=CvmKr0JO!KLO z+MYBcUu(%Iz|V2A^*J1o=w9tTt$l5){-yF$>fH`z;koxdll(B}u%?JrI7n0SJuGxe zBxrO-MZhyYem_h*tTw{nG@ha3okKIM8myN7JI}a`&&v|*s(S0r#L@t!De#txCM(8o zAB;(S-iQqa#@>Ei)JUMeMNtA;eY@@U81+^sdmp=D*)jTPH*6WdKFM}=PE8x8s)7=( z0@~Rv;wga9{`#5WW1UlPYzU|@^mfSrMC5qY7hd&}*wFREkEyiRxcP0s=OVXDh#!+_HV+bP82uX?ew-+jQ_R)aHZjH(%bp8$*8~N}x;Qq$ z=X7wi!D(NY8@KZs=S%_tj@4We@M`g~%{2tIMu+}xEX7B)_msyAs~TJ-j%0tVncdvh zfx|%$Vn368ZqvpiyyLe83Wa{;M+A*_^hVPRS>JG#P|n_UTtqyjv$L0RM5W;A7La}G znbKQzl|OOy;=0B~JZmrOk4V0V*kHP;iCj6V15K32gCXV0H1J&3jA7E$D>c8_NM7{> zIvuN-RxR7VmT17sgta+?BaQQ-&r!|pXOIil+3p!HS_2a~;E_f+F31Z@RJ+%_*47hR zI#wv}dW26N2v(9(3W=}LtYr~gLn9a5sIvVp-`s4Ec&c|H_~YhSi#65;C3^YRkrn9V znpZUlYT52t#J{$7c;3XPmv|eF=W)z=m*y3bRo;QFj~Pf zZgXytRESuB$OZXlk9e=1S=jYtFZw_YLh_lauGwS2BQlP!1>wUiuEH}Wu#T*g7$t-j z5gXtTfEPovx#tBnlid@>>s}nJ-DSn7ZVL367B5>!Fgv0ifct)_h+kT*ge>F)!6QsV zP)RA4y1p9t+Fw-@beIhKkJ1<2MDh}o;dG=bf%K?=qve>sNFMryf58JEK zcgZ0V(%Z+U`FeOu#SO${I@v&U9MTg@D z&8VfGs9O{kpueZFa|UF$%l>m@jl9~nb-sG0cx&uF-%W&6BF3Cwbg^aDIzy9t(Zt+P zMoorj)Ow}>t4?++K(Do%9f?-0wmi;%dSb_G?=R#zN*73c;h&U)ogskaf}F`|PQf{Dku+Wr zf1>*uA0?o+c>9R|Tmr0Z#feK!-4}070&y%+@7C{+Fd_03Xf_cFyZIZU@;9DxGudZH zmChzrV&%>Jt;`0+Ijk}M=GKfG zy*k=qGJfodYXFgs{u0K2jpCwlJ_R{CL2G8Wm?C2^znsZ{h1ykGq6I@>!hV^QY8FrT zlaGI92PV8N4zLx(XMrC)3jgUh5cjjwo3Qq^u#%gU4ywje78C$%hP*V{e}J>$?uNW) ztKi(bYl#YJkkV% zMz*s{&20|mm8gWaW-tcEKF+g&pc1T+Ao{Tsy9euOIgCqVwe=^&71|Bn3cy%G{dY8wMs7!ds9 z&k;WbDe!5`yfRuc?ap&P3P^yQBC2#!46$iUd7v#RL@xOWSv%$qR z2EOLzdE52JRFnv5E654=b;UY%OZ5;*N2d9b^$mR9YHI_HiuFoyhT+2TyL$5JuuQD{ z9O{^qT9j-b3;L}K&5>!tQs+~0-TOHsVws62%)XypFh{!#cZ>xrwi2|ks83*BhNaUA za^1Tly#T9%?G5t@pXXGBPb)=;JvLQG#q%U~0J{V+{A60_vH7!^8|GnnR-XUuz4GmO z8$7lr1nI%miKSZy(o>sJt9MgPN2Y%ysC8(IXWPfTZHdW;PU>QO?*|yBAMB;$!I$KzH#ArG!giuBmUi;Vb(7V~m%*f*YKBG1l)A}!mMM{N;!7kUi8`OH zJSDYgHucthA(d}3qy@R5yCgq_{?3amIAL`enxT$yuLSZVDLw0)cv;S@h!5({z`S*Qp*wjk`_{!#!E78eL1$V3xZ%52mHb-xB z>Rt+r*ZW;PcfOn(W4JMj^L4o)=gv4nq_eGzVJ7zG@GUM=@Tmr$9YOfk+|udMEW1Ss zXeRI8AM^m>oVo#DL#urgvTL4K5kAGOxP%sbA;tKWF<{+xuzl@hmy3nu=H|0K*ODDc`e{e!CI`+P}o?A~n&p(j|oO_7)Jy zqYk9$&F5@}QH{OpR_gQ#cCcdnMhLGV0=qD_q4{Y~#uhYvKi3+d#e2oGVb?tn;f(uo zwX|!Fu2dGV{;b4oR)P{&q{DmxP1MuZ$e+T_Eid-*#B06pT02f=g{x_yVF0d24JH~A?WX` zIcvLjVJ8511wLQjc&OI|p|jI~ zh0w{4|6Hdbzju4sJYtv^$XI|pV75-al#4^4`#xJJw=f~g5;Q5*)xJ1eC(jc6If2a* zTm|=RtfC(HwvCo*yRUhkjEe~`o!=ClIoGhi?ZpLB^%aK!uIl;C6+kkItYorPvb62v==;=Di9O6>K7*6}x;0D!t0GDR4iZCa(~Y8J`mR**+vz z(?;Q{-ZW4Ta+BRqLuv#V9s&8t^}nUC(8^QT-e_d9_e=^%PIk=|+8chN$cWGN%TQ#9 z@HF?&?B5I#mYN(WsY*GwSpA9@TV$=4Y(bNs(!-R$rH9F1g`l}Y;1c=a9Jx&?oz^f( zvnU2J7%1TmJ_b{t`kQ}BtinGHPVdH|2l+EHA=D20MI- zGH;Y{t1K~QO>yQ*dFq7-^(nzVYjB<7k!oUZs53qkdy+%U<+~_|xsfOR6q~(>J*$H? z8~Y?`@U=XO-HUWbdJ4_EyUZ`jOcw=%j>i5gkc9cAE6{jO5IiVh$`PNqojcdcA{cgx{rV^pJK`I>Gz;Yx|J^VuJ=Vi+39!(W~Wq^+>zv~ zCl`;LkUDkosFcBm4Hc)SY(AQWzG^TJv_7Pe&Kdp$obA-Xn};w++iw@{)KkJ!z|#l) zSNn=fm|T?m>Zcgm(cG3=vJavLZhM7Llepgfa9hn&AD$aTvYA(^NJ5nHJEPB2t8f{K z4jj(}3gVk^lOND5a@(Hn69M%%wR1VZ!+c3NMKFBnd^=<$T0if-bN=-!bZC1vZm?Y_ zbO##6fh(EN+=xBy&7g>@LvEBDutqnpb->?%LqtI45hbeTXqkj^*i+YbT&rM7F|Hry zjJ}*+q?-{jH94cF8#fk<3GQqYDr69{RD*BzBjFI;cH`z5e~Gb%?JVDmf|Uc75aj9aXd9@)T2AYSJI_@hg+*T27dM-_?ax_hA=Ld?sU0bUmy6Rbu%NJ zrbL)V}7z)9B!_SJrNuv$2KPB9#6{fx=#vwB7nF(cb&xSjP)odMvB+$!jQs_4b;2 zAmZp!^66`+eAn;D!?C{cIzt<_X&a8sB3-8{m?0X*tzq%hCl(hES-Yu|7Y{p=4b1Og zSVtUcK*f<9$lFmvtEso!^m>0BseK+0z!1{Qcq{YK*WMp+?=@rKvR$OUr9P}7T`j#( zU#J#$V6JthjzC3Aobu5{h(4@Hadio8b2MwP^2JWbG&9< zus)5cmsuRAeU6g)4G~6c>KVZs7bz>(Paz$PQ6o2V{Ds@!RCYT}PIJ%jRr>(R#;P^P z+)#kNTbJ-Ii*3yVU7S^aT6-CMsHDeCXmB59Auwtku-#F!kY#+rYZ@ zd$vrOq-w>Vln`7@(IUSp`a+Z>myOIwwR!qQgtG>9 zvEISxYXNc8s`;DLXvj+=*1?Li~eUYCW!X_Lj=B<(#3=DSvPPB3(E(d#74`*D|E+fltPPe zqu_QP!4(bRbl{T0y%k+;Y8bqe-5exeTppr}$OA6Pjr@KZTPLXIs@sh}T1VW%JBpm4 zx>h5oLw3 z(+`mL#Vk$oOGsaIf%Gjw-&@E{(!DYixOB{<5>dYvXcBjRWS^QqP6y&rA`5K&Nu_t>`c)L}$7)ud0=5{{~3 zQ$+|PG|H9$QK3a_DLFgN*v+WYnJZgwQ9}~^)sWtxyi|G>qpC)S$QHFCpAy;NA%!>4G;X#405XQ$<*; zR?_jtZYHagw4X|^<|-v^5v|d*YDpVZPFJl`(i~A$sY^?GF;CTKQcuoKHeS+G7k7jI zb>%D!F_WMCJ}BC3jemFR}mtDJtZG>9&0Z`{!uP||Ag;D28|dl%RnWQ{@T;xdde zU1bwmxH_ry))hxOY+C!YRx+Sw)m?8^8Xd8j|G{tGuKqXfTGnnc8c=^=uTACRoZ?p{ zNeQP*sv!XTL!}!p&Uk*cZC$ulXjGMMMhB3@;-o_87g8~(7*nRw3pf(k;o>w-_*ahf zAN?rww|5d*c&8>UNJ|yL4RCw4enc8o#jr|0atD4Cwn{%@h}Mu=wI6w?^!lt4=A;13 zeO@KZQ2@!U8s>7|ppLE*=KlB9vj|TJ1w4UI6%o4X1HF5LI=9LLg#vpsUL|gCh^jih zT6?=#IUTu5dpiy6ZPh&Crb_Rt)!G~2313%fZ~q7CS%fE41D*h~AowZ|gai(>Oh)r7 zmI8ZYQ$^^m+TK9!xY`U&7uefs6G4z|39r`PKvK6%TKj7V0%@%<;H9g^xBq?h2ruLb zHkh<%4FEintKJ*{xMe_o(cB&Y>1tz%B*^Vo8?r!HSS|E|@Uv=&cLQN=nNYH5ZV#fV z&ng}6|3Epy3o<8M=d{y>WJ!?RuNJKVBCa+l0OVbD@NokOzYK~lDryi&Rtwf3UP-Px zD1f-QOz>IM4*#hvRa~}_iO3{{Rb60NN4p`K1h4@ zzmXDJePuB8Kd21G{7t~)-pw%s@Cb)RRQTW%M^?&rEvftiGWWk-lY=V>! zs0;q7+5O8(stX4SK=Zi_pyQvK-M_4)x<~;5CA)uFMOAn~7Yv#14%$rru43Av z6`p@prE`&@awaJ9{hNwuiw=zayDFWF#00ww|E}4*Kc&t^ipn#fsQho5&0Bm#_1`o& zxk#2U2(pCbCjg~cceUUQinFbFYdv@0Qo0#y7kuyaR}Gb0Qw%qrmFr=Gi)jRIq-Sk- zJU=^qfAf7UDKLRX91fGrhL_(X;pC+Qp_-c>-&VA>2nB3#cJ8W;2A*pV zo=R!NKLR0CLkFg$|E&5O3Ggj0*A`?t76TLj`g2h#y;GB(@RnOZvM~HZAvE^+pwGBt ze!!c@ho{-WF)2&5#wyoM7f0z-6gD>vY09N=-C8nO(1Fi@~z?g@xv z_mAH1P4&mm&Pgfae*hnLBiX!T+#5VeW1njdhSEOFKgDpb{cig-W;?#fRdyfzf)(C! z1AI42pQ7)Eb{q$o^WQW7uoTZho^2T7yPa9ZZl_khTWH~KcPuX3e8>hf4f>|UryW*;cf^M2ioA06p@ZKV z0svfL;&TwQ4$QlRkr5pDU$IxdCD0B`RrG_P92NVEQ7PG=oc1RU5xWZ8OXIT)>|8pVmErBwVpc5fEKiIqy$C;fOUWq$$6UU|h zth#y$@GZfuv7li9I3O5+!q0%Mgaf)0hkI8P#QrS%Ka%Y-fvgvx;_Ni)N<2rGIEcFv zyZN)~e=LEe0~r-3sp`d50#)oF??!=e^)f@U3tpyKC|+aziDC0zjQgpe-#Ca(UtEO zJH7JVB3HiK&{gbqV&QK2mMH$9Vb!s~*Z!0!{$b^mWnx(qh-H7O8UHW|EECHnfPej| zX8aR{uuM|c2B`R-a>hSQ0?Q<2XplJksb>5Gg|JK@LxMo|r<(B(lfW{8Y!G1hpK8WG zQ3%TfvMvzF{>*0l!z8dwAp0|#@jo5S_&*wZS!Ut``Dfx|KVd%Q&%_6@YWJs{@*kH| zmI-D5-4h?GOSEkXgO>BvjGy0LJfoY^$5Ci4do!W?;oD<|DvzbLj1lkA6ctz7UQB)H zAY;vIXf%T7J}23>{tVslhn9Q2W|h;#_b9#YBl?=s@| z3ksl3sdKy*ZsiP)asKFGYsYqH&AB!oyu||?S!Vyc?LKlb|1IBTBF=;o*qTwa|Wub7=(eFwBdG=;Qz2FFSuUH*hq<@b|(!5MK(r@My$W(k?uj1>uFb z3y=2y)3Qu+TI)(No_(7qoG}4d-worx)pP*K`lhk z|BCOj5fC4|`g8`u;@+Te16N{jiMaM#@U5OCq8o_7kFhF7Wf^12xYD!L1mP`FB*Ghr zSTQ{s*y~a`9V%h%7OMe2dly`owcKjK>WMcfDVO$Xon*MEE4VNl$p$rJ232~Y@eg1{ zc<#1!yzm@f66y`JaVK`!tIPjZDpji~stVV44{QlOyb-KCbRVod3-6Ex*gOJPyB+Kc z-ogp4ZV4ixW}bCF9C!n1tOhPo4s4DF9(J8XXkP37K{~GxYW=_ByG%r_ z+hCkPFeH{&7lJBrE^J}o{IB>fBi=f}lq1r7?j3>)QI+`6^+E&&!4SM}@E`tNCW6W0 zN>CGk6cS&;y%1KL04X&2g%ti*e3x;Sn7V(Po0(r2zzLK53wgnR0p*!LSrh2;{*$Q5 zPXzcsBU1CpL^?tPBEAuQAt(}G1+)M_|2w`rmrNi*fYXK(CKF75XKmQ+l?*SFX zx~vTYJ%EY?m7o%aj7nCLL_rBAKopP+q99oihCCx8C?H9MMi5X?P;#7+I0O|D5Ro+G zB$*-SG+z%G*!%2#zjM#J_rK?^?_Z16)BSdJy;V;=Rd02}H2*7Pf3>C4P^(#$x~KvD z8;w7;r3&f#gnulG|0`sfwwsXzL&9bP0c*X9U4J$~n1o*I4))(C75TaJqq_dQ^wa;i zz1}Jrg1VP2%TTDVU<7ksK~2n$e#qtT`l0o|>xU-(?!@0-(eQU2RPTS-BccAX3;Gr3 zK`72UZ`uBHoN2dTO!Vi)?|+5t&)W~wzy3hvKlAY9|6AE#jcC^Y?uRme{SfI_BMRN} z|M=tUKNr%S-%S3g=>G4J{n?0`Kx@bUg6A*0I)VSIwLe`WK4bgW+J;?e^l$Z8hX+N# z#GaaPWR|HMHQ}I8G_Lo)VnK0CuUW|2r1$6`A~`$&pYIv=y>~>5%_Ok-t^X~_epBO^ z$tIp$`xe)>C)AU$OKN++@u+FheY+oa_(3x}_37rJ7{hA?2j5upTx%(km?W+BS@fa4 zN9_}QFWBeuy~{rJ_ZZ5D%Nfg~%5}hNjn3Us=rseAd}j&+{x726fiw&%4KS9ddT#u=_yn4?9c%HHdpo`5e^whAV{wZ3}r|KX7V;-UY^+fVZ)w%FHk^V(mpib{3(m#*be=T6B|4Zfh zN5uX$z|u0TU1~kUc&}w=>d~ar+U~K1+3vR`vqkN*rAQ}{phT0PVQ4Zm1)3C1jt0<_ z2oeMgL8kLLELEH2I9|z}=|YL-@WmtJEvaIqVI11YT5m2H|RfzOeKGl%Xv00^O!nfY&f+sOg%v2&@?LTq8ZMzEoQyG2g zBn-!+X2pd1T&y|Zchccz^q6*1T`}a^qmysw{*$ix?slytlcIEOWny#l>h#pum*`T| z@^JrH|7LM<@7gq+;J&=DFf%p%r5YvIgB4%zM)j49AdA;FF`gr1Sojobt$#}a&Ni)p z6oao+xX&kGk|Y&2`v`qrZeDJLm6-*TB=dP6%&;PsfLNY431nXz%Ob38ZZ`EIR~M(c zd#8K7)`qHe69kc7i(~ym)Tie-x7@+4)ydw6)ywc6)P_1u5lBNZ+1D+M?LxV&siSCG zPqO6t61)h*{rDrU}4YpFhY$CVY)TywRpChzN+w&`ei zMaI!!8|qITk)s#gOb*?---CJ83(k}!Ptlh;obM9u_rAP##G^N6jwj$kb&>)3RH3*+ zM3ibjb65KD_IX@=RKAyQ?Bek@OGyLNK|Hm6YyKGdq=n76fLF>M8RhTvdMPu8DI!K0 zdz#b_Sg0RZkK?4NYuPxxH?DG_gj2k0LEd~KQsMrb>T2V>rCjfU2CB<);sQP_h!cE!#X;-lZhc@`gjjUoC=k;T%bO&9=MEm z=}b3Nz9}h;*jPKkX|sHFHljMYv&<)AXaYvKb`RH!jG#l^2*hTfH z*|CD^-kELg_`JJQpsIC+SJiS z+;w?at_|&9n>@vOQ z*UJqlhnHU#Ua$&#sK`fKe_vt0gT0pbN9t~b0sZ>~{hO%F5yoc|h04Po_E+domxHX& z8hn+i3^8D9@37J;wWf27=s4O7?Haj?O1{mwk{QR_LRtJEwt3)0v9oloeTetqVOe|k z$juMNt?P~-jnU}OTQ?+ayiYl|*SG4ln}G9Q%_R*CZlQ8w3*_n7CM`U@j|u8ZCzO5h z43e%|D|v=Omm;?ytj71Z*Q1+PhwNKhj^xDJy`8V^PER{!AxVHY>xEiYhM-SXb}FUx zj`6&Vh_#7-rLJ(iA??CU2G4xh1lq2x&LsQvqI!*A7dmKE823B|$H^4igwWn3kG)E` zAMmi=ia^DS9C0})C1-zqhRl5~$4oF|ZQzqwwE*f}eSt1=l|#NQvecj$c`d)#j{gLe=0QZc{ zCc87mu=E~I%fnA6$N+9JU(3U%3k!$Mh8L<%!YI_DV-%tp9uyu8lP>*)U$`;<=Gat8 z$U(l)&zFk|!*TeMkoq}JA=;<)!LRfRr%|6+YCgZLN|*MCH;GS+WeOUJ4Fz4@-TAT< zDqeU6FvX;J_CGtS`(6fH!Ee(4VdRODVMn~G#(Yy3?+~-xDaz>1J}=MtBHm2l10_+_ z-%d`J?Y)$;A1Qq5fVfTW7zjkh)OmLCPiK4bldEbD@~N3x@4FUyR)iLq(8d-;14 zYT@eh4;wmB=3P#4t|7sNk#iF=at-qrqFufyKSsLiB3aAVlj8dm6pSq1mP~-I9~&o! z&FiAE^{vLbD~BlZGc~rN3=M2j70je2BDhe?nHiCb2_nxIQ6c5Mqw8zR-?D}aLa}ls z>($jko+CN)rac={9_GeKnn`XULe0U$s1?*<0WsgcJjKMr4-!oJ-2;^uRu7~q+a~n$ zGX{A3TZDI5!UB~o5?<=LWqPZYRy{~oH=dHD^XMw5S*D+Q-f)2xoqp~eOVJ4x4)4zVe@3p&e`P@^X6~=G&=M&^(aNnDN9DMXBc* zj4r!eVK8cWZ!P)t!4d67RLeCc?Zy^v2JJ>|$iTCgwZe%Ps`_ij8R0+CS$hQFKfQ>> zg>y7J(RYrH^CG&a3s^oNx>_zzzGJqwdW?UU7K?L~{FcbvIhx8F5N!X7hdl?fAsxY$ zAqlx3-r91Ixm)exnHx!v;HZi|*+FKb?pJ}CQTL#Y#S@fHV~dBmKICprM{s^mv<_s( zfftKHXaOXhs>2I3Xr%F)BW1}vAy|V>}c^p<~~c?)Zmz+q&s$x4!L0aP#v=z zS6l&mhMR)@@is}%tvMD9nTIWHZJ%Ei_eXT1-9CQ&cv{>1wxoTKrEU6?tKLDk2R9xE zw>YH^*V^|mHsG!~>f9aIc5Jmvl}dA8PLrCDK!|5{PMV97!6Ns%&XcNd*EdAE$Ed)uq*PIrfs-ujOTEn*Yi45bt==R2rnAc%PZe z!u;cKR>cxann#m#18+xIj0@`5t41RW)>h_29oVL~jN-AzxCDdc@m{DIaooz{2u5zf zH7`=`38cSU=)_J+GT*t6MDrp5qbJ$3XAj8*i9?`|I7}QhWK?V4DMGh#f6Mo!0c~!+ z*20N_@81|dy#zToNmLT;IC8neoLLCo&t9E3ctIKyWoXrRHSANOO0k$FqOj|^NzZiA zhq!A+tZUk5YNf7!Dr1X5_om->XiI?p&HZhzH5KQx!nze##{1?5x>t4E_nJ>Pb|RXo zWYn^BD_Wyx&!XtZJosIegdbj6TKepvDPuO7Wql|(v5bNF2#@1))$umb`$4@Q4GqQ9 z&KQYXGJaije2O}?l5LDB*pO;okDIKA#~-l6tEJkk8_2xTWVVX;Z$Wfb^=Hez3LWHj zd~(k5$dv;UgGQx$UG1=vTEZBMHo4x_Tek(?Xe_Iw8apeZ7WQqxnB_$)LGQE=T2n0| z@*9snZeDI{)mT=Qu|l6cSR-+nQTq8E^N&DCRRmC@g&<`RI$p{9t+eN8DYtGrIJAsnW z<=>CFo;cP|@4%M+pVf6Rq4S~(?(92(==vxKOTiP;|>qAD}bwNN#;zYX8iZs z-y1bg_gdR)N9OmJi2J z=b=(lkEUd()qjZBq|J@joH28?RaWjx>3p>47E8Oq_X4HN3i1L`y8@p>-~dzU`DbY1%R ztCxoj^t2uyL8)JP%&Kv~#$fM5gr%L*K-JWXHU9#IP>2xIymU4X#o;SCr@G#ET&Npb zW|VPMnIA)sIGAHAFJ)=t#tH%>0#ai1aOp;7fzA62l60au^!zfyPSl~AuK0|=ug4x= zEvG%Ik-Kzc-putjisP z!X`P4ghcud$)D?m8;plk6eE8HxC)?Bs@zw@(ojj=b9*%saKZ^Qivd-00cR4Vgc9~F z1~knDs3ojyz(;buj%}@dMJ|0E4~Uh|(cApi(;wcFWk(ij3x>X$`7{nn_!898Ogc9v zxWHbn#bSES*J?akL1LU4YJA^<_H!mZdiEsAS=(u3VRHm^-~jJ43vEu)0RD8l1vt^$$c;Y`+3!I4nGt~TUZNn=>XiQ_qUgiCb3rE zUeqYdYdVbQR*?w^eNA1|bfcG*1jp{eJuLgASG1Q!MI-NpyT=_(}{;LC4%F^M+ zH|dTj*F9z7@y-~YivMt%a5QPNP562(AznIjtF~fwt=WRGqUGA1g?nZcL&?MXOCzb~bHBNvE+5kI`^20WI)>gvkX<;WMY?$2yL38l%>FOWy1HNAE zr$2$LppQ1dg;EbHXE6cpZmb1iPs<-na+bSrGvwg2q;o1i91K194CI%$cSE@khev~| zY=n(h!n#P9iv9E2-r~Qu|Lrha0{QU5(dY;-ztc6k(Gl;JlYb+oaS(*Y!{45piU_>P z2~z0-%)A;6WOtF&b*mG?TU^4HHMM$kPEjR~R!%ZJdcYa3<`q@)oJaU%B-o)1aImlH z84G2(7k*-j4uTDH`h*|X_zA?o_5cXz0$jYp4P<%l^T*_R)o${}+_Fg2yY2k->YR&+ z=DtYI*DHR*?d~t#-JC%YJAjkRPjFt0ztLo^Wz`|DB2yTx)~s@f=lg`|3;Gkv7iOsh z4;D0nqIv)~7nK3;_!V)7S9&hIF(|)p#(I=;JSLRDYt7?Yfs*>d4*4dnV2(M!$t|hD zKT@A`w`a1C|7nLy62rWTjKy!s4l##(>m5lRNsUfO64^7k$lq*?Rl?H!|BLO6n^+3i@aaIX&NpWKE3nZJ z;Nq!oit(5qeJiPX&DTg$U)$l;$l_Bk*8NYFUaKANxos}j?Gk_N2$*F7aB#WK=U4a0 z22KV`v@>VqN_O0uc#-nUZxw!gFrowOzX5P@4O`Whx-WDwTY1I>>vS{Yi(Gz#>6R3^ ztRmw8W?Dc{LK-Q0Wj$ts8T*;-Dkb&({-BY0HdqJxg)XG=(6H6TGVlEF26i==jwcQU zJZ*{^V5K1-!M1+82J>yd%%S@ESFD9J9v8}JC@#FzdPVP0z}0K53Z5~8IBTDP_}U<|4l0=&!_ z5|H(uFdbpLUDRQogT}XAzl0sbLk5NO|Kv}} z4mzOObts139pMge*3~64lceU%9o%;bMtP+P7H$i&dv`pUW)oahH*k7A0d2fL|H>P; z6yh+bXb5m~F6Z;~%IVLsdI_J#xunRgs(U*9Vz_HZ#B@F%sAvrEoba6MPU7pe(kN?+ zH>_!aAb|EWw-Za{{nIiIh$ULFf816d}Ed_(zt z8u)!^1$;CFd_o0$8U%c31${IGeL@9&8U%f4g?u!Gd_skM8iagkg?%)HeL{tO8iajl zMSL_wd_qNh8bo|(MPF)&z6=$8*&zCo_N05q(`mNLtM;@3TE$cO{JmDXnZG!%UJT5| zA;7*HP_j>1>6Upq4;6!GcZsokMy?%E)A@qBKTC*PiruO@SYZip&{R-KLM99L%5^|! zD1Z-50EK;%iNA&oa-KG7d|R{VEqF zZIxbGemha*Lg`0O!~Ir~N!Vbr;;90WUK_LD8jY!lmu}OPW6R2{3`IZeDOk6xA3bq3 z^GVA0=>id5Vx4r$@>?~g0y8Y2CB>+sYqP1+i*T%Nc`bN|n4T`X({s8&sMp4bNL3z= z)}i%wKGcL{l!jPCMAVS5HpeT`JwE@$?))g#8S>2d zyj{>Zp+DF4BE0!boYwR9=jD#46R&<(DdX6=Qi*MBIJc~>mZ8LkJU72b1`M0L$mjcm z!lmz?cU!!G+sRew$qnahRYV5g9a1H{*LIsaGxrOhhZKcGk zYa)M@Q5%i2ws>&b3QDVP1$+%{X#B>E${})u-0dsKuZf1g(%hGEh*EIJ4UVd&#EqF_ zpJ`{}hD_UbPW)0RPrMGCvI2NGWd%Reh9+)g`<;7hM7wrGfHLFrE-`K7*Hq%X+&r=w zkX-7<3++|Kv^ig$-6*G5_tNM`PM9Y8g5mlA8~yT3{s{%yRH785jTSofA_Y8b4oJYG zHyduT^0`EsPM5p72ld{+{zys%qU z+)e^sC<&lx1QldE<^V4mD%|1=?^VV1-z9;z1BB-bg9%0eJjxuPU^79wEeug^zJh9u zV(0D}^IIp+Zk_o=(9lDacD1|EFhG7qZ==B>YgZc@ir&~`cN(|&#%}dW=kJ+AA)5;X zf6fd8w{8J@K#5y`%2D}tGntD|(L<`cm0BAhn|G9Q%KuQB@SY4IXKjLPF8dwXB&5yi zm31OhxOkUW@`V-T*X9N<4$8(lmuITl)rEFM|HiWUi{ZTGa&kG-P`fbpNb9_jDr(J+!?HLr^MM8xU=T^Jeo$L+(T+ zu-UDiSMa@+s28u^LFCr2a(cdaE@G#ea*kQ)B0Zdk_(nfhWJc6?s4u^|Rrmz;E!S|n ze}Sq5AGl}^a1iYrv(iI)JRRaYR$GzDCs?boo0i{lH=qlN>l7!qr-wc?_pR0Q*aEM_ zRn(Z3cBXIqFOc{$K5OVlZWq@>DJj~kV^<;*77Vss4{~B%0Q;-}X=a!*w0Pxya7fHQ zt~;mE@pK2bZ^;|4E)%&A2eWMe*fBY~&l;i782tU5Qjmj`l+~5Yh~E==Y~Wuh7t-)b zM}wlK02`-T>m*yb0f zxP@Phn!MFjcApwT{WsEkFUmJ=OhhaV?po%& zT9F&+oA0)1%H@gd2sL5bTv1-14O$vx!dLHVDpwMTBMMz;gEnhV ze<#w;wL9zekd*?`eSxS*7*d=M-|gY{1mIVDfR_WgF*o`{0;^^;KE5k0cWLAKp$!E6 z-5L2Zs)fHr6)|O0|EjTNx8;zH9z>71xJqTA^PwIaiHj@B6SG0BfAF}GIR4XPcYVm? z#T9aSTk=Vd#`_zI1u^b4)f_`sib!|*?~s zv}MmmF8j;GL(+lXXZ4TW%FfJ6vT;!gycVboOSg z@E!dT(BTf$eEGA#Zy}pOh=R<_xU~(+k4m2PH z&7s>wgMbtn*e|>J3@Frf_lki1NQgGK`Xuu3mBZ998VDTDJIpxYH^0%@J{|?{+<~5) z_{8FwBxbCpAGGPp;)er#8GK_1(q6cFu9U+ERUXVfsBNx@Q55u%Nj5!lT^&5W=VE1G zHm~g-gUXO>K9)VIN~f+-E{e0H?UC<2ZEGR(u)ZzT?Mh84F84_++jCtf>B(ON*pKim zaOX*B_!*TFvUFHlIY{FTFtA5r+P|2cm7y%3cu-3S@r(0~`RzBhqv8vQx(6KN9m#Ig zsCO?|h3hY#W~u|`P3#UxZuXO8?-B6FR@>#?>RRA~nM#0kZopCAO8%F{@3p%u_#Xyu zHJ7Ie4p2~0#x0h6MN^k6K^Mf^uC`D!(tv$Ph_+o8R1fP9AlDJEddpb*F%BpHX!Hk% z-tUFr3m0Oskm!`MH66_M39h1$ppl;V<(zE$TrIOLi!*q@35sF81PwDz>WvZ6K}P;25iv?E)pEvE6J7^%C_T^gtpGL=kQ-p+R&Uo*6yUv_GPL5bbB@`^Cdl zzK+6_<2sB{1O2Fz5ly{qKfKGL(_e5ytmJ{O}JsA|c$f z@EaC>TeGYe2=9Uqpd^lem&Xt+lMFksaMdsE>jYUVW$otVHlWmhMU4zmtpA-SR=x@5 zM9+EHzDabRur*5~>QnAAO?&YNe{{C}VNT2T%eddM*uv=On{j^^T?Q!(z%U;O;fzW~ z^ge51iJ^u*e*^cJ*>=YuF8S@r0tdv|~df zdCd@XglYkYdu#>+B3nnZxU6HNHdcOjbsMPdq-ovvGaxp8tm#BaT!p@(*#Q*ogDZH2rV`slOX8N8bdn-wil+tnlYfxkp- z0ot;(VilduaK9pacyh@)NP+*;U9iy^;F21$Lqk>(D9HLN}>`z3&UX6i#r`6ti2ZyuyB4iWQTc)SyOIqW*3_i!IY`1f+06+X!%RgFc-N zXe!UO$J|hH2r9oULHm4Hw8@ck&i1ojPeBTG0&J&?a&Bm`$zoY2HUyJCOo-V z&A0@Kd0rP9y}P?+H&G~{wXB?mQ-JXg z(Y!9Ov)Zuv#6p&N?t4z8PM>MPA4y@oO$z3MJ5ri`^u*PTvX)%@cW*#J69x7np;A`s z=bJzJB~5Va6GJ+w}-eCfO;%GWw8-WZNhiia!{I*iTG)ZfL~~$z!bw zN4k-2uehqXle=_r-hqyHFkttIwL21$eM_n`s(+6G#h>lpk>Y_9g=UhdBA}H^<{yMa zcgh2MEdKBhA>M{UQ?_V=H55vJMZxV>idtgZGB|h1!J>ML z(`4xO618Fq)kgf7QhU)EH2A_7;AO4b!>Z(gM|(`y+QwO;xMiyd0v$nudE#FzStP*6 z3+t(sRW-4;Y%N-g(LDBmV;iYKi~OArU%(IkfjY?tm9`zth8O@SPfD z@&m-FJL~3ncW@|@BmrMW0;l%N)W&Y@uY{l)6Cwo;KJ1 zMEBK}uv)JBaZNIXK(D}n$o-FdY}}KC+*`fxd~6jN$uVL#sh$k;KW){=qd0s;k6tBc zy9JzysV)Z1$^mAKLp5MT3YNbB$iet$fCPqYKMYTCz+-(;fq)g>=w)4AYS?OGW&=eN z01+~8S@3xyAWb?C$`wH$STHOJkb==IF0JnjpneT3Zx4WuUjbQCBzQCll5PMs3L)vO z&dzEus|m;i`(}Y0@JuQ+Gj;|TCZFl;k%wb^<^f|;@XSYORQL@b0hYG_IWWS~(gY^_ zEx{e#4y0fd2=j#XNnsfDDHA8&RbP#<2%@_Jgsexj;J6&t-6y7M8hv0j8b? z29m-cG9f{QgRo2@0Wg{`0FIww9|Rn?X#`#WT=AD4gYQN3xCont^(CA-J#87|hkS?BHw}?u;F!@AO z`^yE`hNtEI%1OiZqk2)%aqkx5AHDu6C*1&E5rG}1uXONOUuz?j32&^Op28PzCQGuE z5#J5O!=$;FzzGJ}zWv?M7>-H)wuu|t4#f`srWm4=N#4|CCM&Ogc=f=$KjLq_It1zY3&j4%b&KwYipshd#5!}6mGmE; zJofI-`&&;=E%`P4g(nRVN;ZFo(*KC=KO|}`l&JT;`-A@0Evh9y;lFT87{^rhcZpgC zC2Hai$o@@q?@rV#C{g*B{IdSSt1QT?zf06IC{a^?copc~pZ2$i{g3P3ov39{qB=lc z{Z7;aKhv0Q5h|)>P@;l4M_`isR{XvDWB=AEW=PFn0QNtu`s8+dvh@GACp(SL|6A<| z!PP_!x%n8K%_A!a`nZsCF|HQ~+U-5_nl6zs5na~Z@y&iFq`S`wyfOoDAIY+_k|ZIv zt23Qw`He*^W>Jy3g3=bIvE8pSAg!pP_e3f^(tp(9QC#p^t`AtcmjYhNBjskoqF>9A zyrEZWR%&it&k)>PB9LM?6?UdXK~run(O%ofVcp-`v6iMl2!*3IRu`)p6gHfes!=PO zaO74MoY4Oe+px9LL|E$|Ng&M75;ldmHn6C**=gkJ+B#})&H6*s=3e}CGHPQTP8b+L ztu}?C=0Sz6`2^(JYy)a*$N;s<1ijcE%a0;RqE`Eb2?H7moBg3EXah;V{%TS-|@|vsDTk%Y;voTZ@~)@Rg5n~bumE3!uOd+2RpsZPDQ7iM8}o!(E)=1O zmas5!IuE%fj9M8=SbMv%*@^wQ4xJuDZP^r|)=|*6IVktI36HjOeJ3Fa`m*QG-|i5H z@q?DvVK`v>yJ5uddYr^$NWcaF)K%L!zfC9Y36pm|n2~GREo-{=qg17>b_r)+CoY}- z-Z@C9;5Ohr^6X|Ow>e?r?kC%Yx6YsNcRyiLZnsU22uxjtyqb@o*HIRfpD< zVk=)O{RrD72CQqOENVWECb_1mB&bYiIrgN%vtP7GfBUY5y0|Zt0}ql zJ@w$p%LXT`CGEs6+dL7Bczh|>?up}uOH)j+d?Za_cYdQ-Mtg&0#N@M^z1)<%r^RZ* z&xc%gy7A;{#Pet0ySPi^gV!XE;%*<-Yf5%+O8!Q>)$9T9g$(RDw_j@vuV`Hwa5(u^ z3>tN<*}mguOzTe^1{Wrh#hJZNusRi6MOf+QB{cB1pQTP$a-}tRQkEmYu zpU|I|jQgL__$zw~8l!?$Bs$QIZj6GqeQntMR#rpV1q4-_@;qC-vhg@CnzFzW zR6GNNqi~;MZiAH}KgNk|toqMikRv1^`S$VGB6)91cSqUu+l@Nd;i z%dC&Z#O;4>#Nvu@=~9W6INE-DvhKuMwO;e>L&drFN!@zaqyr{~5F-~;EY}CF6`sIo z3=DX9PN6jhDl79ZcB`+88C%qJKO>){{UTJg?WV(W>~Bvwke!cnXS#m9IPFGf)Oz2JLK;up$onF&RnjUBx=33rreud1k5AkZIw0j4T&`k3gu7D(g3Ir| z-sPk$u<%;nWWjyC=206@R6+TF=*zzLuZ=d8S|&1K>V;YLsxC4^W%gMQ>n8NQyN&6> zE5|)vW?j6sbhl(_&1c6U$e-Nzi$G2rZQw(D`39RT_@h#!DXsP2K&JHrvwiKFql>^> z6px}|PF82a%jt%R81L>a_Dxgcw#kX5l(B~cQ4mBEQdgOR^h}~zm|xzAD;2wzo)@>NANjJt4z2x3#m}}lEcjLc)wy|m(bwLr z_5q3n?OPksf%z(~uEs+z#_&0y-C5XC?beCNO62k9lE#DkU$lk2D)Z-liEF>nb240d zKFUf5e645MbF#FxUl=8Q9)GB>piWqpRH+}9-LAvI%#e#$l8EBT2>Ew>;Yd=&k8x6u zC%y3}#ZnCD^=mA2o@D2mI*R=!@Afk+fqRu;?5N`O#;JvaPn*FP?+t;m&f7CbTZ9YE z(j@Gl6u3UD>)bkQcSE=jN9}5x&+k^4ysG=$BzUye_6X~iH2$X4MV5`tj+*52@+G`9 z8pmUU>!LdSQfFl+DnHeoe9^-vTDvYYOpX{~9w@wF;+z$RXUg?eLR|k8vaj8dL+1F+ z6hG8tdRQD&?zrLc2b)?_$NZ`+a2vt1t4dZTBMI^G%ijd7H@>~oYv{~wygtGoINz>Q zeDAhoS59N*fRovL-$aXuctSF3UE;@zSmju1X1j*OkE(RdNE%)I=kV@!sHR3j`y;jN zK!K~DW?oE=SrTp50mB#Q#_RQKHL3*(hWiVOdm(Kd4R1SiyTE;lFlLm)&H8|54^Apc z<6~X!FYio{ufM%gU~>Xd#mbC7vDy5ll?o<}B`A5*xO>hF9|~cXIGW}F-{3PSFi$dC zTu`(5WR9slJH3MK?b{A$1`3Z?i!%1Xc&={E`GBMx70><2*3~M-N5@28 zt-+UWhE|lhT$yhjipW3_rN1p7*T-r!+J;tayn)-Gt4(|9aJO|&$@#A`Oyvx`ZXXW5 zFrIL~XM>)lfs+q0jodnPdy=)gxLH{#C|^iR|N8`|Mv#&b{p~C1L7alAo}Zwlu&j4! zk$e48P?5_OkipM`QRyLL3s&(Ei{O(YwcA&`G0$J*e`-^XXJqp$I`%d3I+L>gwNSSg zTx{b9Xr14ml^gI0aZ6W~{RYY_!^B{3*=Emy2;$y|$NN)YCbS2xDMQ`Tf->x&%Dai? zvs(*tg1#mS_^(%7S$$4QPh}=)s;Kt3$Ube%ag8In<-B0Tr*woB)plM}#j@Px}e%LVo% zko)M-$y1T#v3oJXEEHD+%2RU>{Wvx?YdoGn?x&|IPqi=ag%=~eh2pBfvAX+ndYaMX zLwPSms6Jbgo|$^uKo;HpQ;@`9WL3Z|n!LfXqDsI`o{G%^WK@OGpk(XrkK~cOa_P#a z(VTc^&6?fn*d~21V=&j{j6t>C1PLZ&qLtKvbvXm*lNK_heDBirjwWp4ofE4_o8yS| zz0ARHE@zCYGbTuiLu}eeU0Ihiff;EbW6JL?T_rSMC*FCmX16&mOW(^HoO3y2QjMP= z!G=t z*sqllIqLAe1C$koaSRG+_0Umc1YNK`7=8(M78JPzsS3qDt^@B~f^kr9h<_)?K75RQ zRMICIPCWUFxG@El)L}JXm^$pVOwT8qinx*)9b>AgAwS7^{X3GvC2?){*WLT6OBuTx zsT{^WSdu!77xZNsyBTDWFE3UydkVhGW9sP$0vk18=fHY(m^@L{6Dc~)%Z%u=*dO@#$xJ{dcQ+LoM`NFXn{ zymWv4=3sCxQ`d23hsgQ}A5~rus|j<#+}DBuq!C}w-;k$@KjlXoqd)WNxL0%Yeap-J zRmqI9cKhIx1%2*USIXa#Ydo)1RTp#{rk8iNZoHZ@lXKOJai-!bRlKZUXncg?1&#>1 z3u+)>4}*UDX9qz6ZSKpDkT=+Uq?8nPb2=qoj7JK;O^ zS+niomkis{HUEip+wnDo>#g(&^I3j)!J2`yu7^;%Lty&j)U2d&8|)gEVxaBe6CH`v ztk{+W)fSX_0KXhQomNc86WWUF7UR<$bWkWZZ4=d_sdBEVgjZ`>sabQgwVjKoo16ur zDr*|?p9tdS+)^rKQYv7tkUey_D0?pOEPdeFgqDT_B7!T z@jiD7&c*J`K|-?H{^KnMdv?F}gde;xOTG`xc7=WUdAEB4wAF*1fhE#EI|yd$!PZd? zy{m(h3uP;wxd}2;U+XGbO@~IYDH|r8S37zxyv^g62`pV%t&)~Do*J7RLFBQ7f1r2Y zm_dNT!f=J>s8V^k(+Q;|UGLUBTEz$rjg!t>_(qFUj!YH(HCb4rUYJ2B++Gk`irK+e}sjl>4CDWFQEq!aACP~MG?zYj3X@*(faVckU6o#f)<;^jM7 zYKA{H&Mwx#^FUQe;ZSUSR@R6mM)l5mQK5aVFgQ<$j_YNqZ<%yPc%9N_>J(TCkNJi* z`BK*9?e18dG@R0f_p_IHI%FYfVqD&UJzXZQkkx&sx&6*67bZ%uGHcpk8MT1el0187 zV==XTynQlru)YEn?|pjB!$U4Up-f@bYtta2#y7Ecug z`o}U`@{PELs`fg-vE7?YM`Z7q*tTPX1<>I`5;4g9U?FtlkVHGQBZ$sf!p()Ej|f0N z7*X%A1@xF}#yh*&?+T-9qq9}DtC-;0PCEyE-Ys?q|9DA-iDV16Q$h9@V;54-6WmHR z?@WZomI|Fvab+N5uqwFWrTbEoBaI+$T@uIdDy$)iz$&w z#hi;Rsp>M-o7!Wtbh1*uJ~d~({|NghS%?L`UnK{vB6#rxfqv|W_tZc@Jbt-Gr( zbx6@wlZgkf;_3ac>&VDvS&X_bO=W+H;YRw>dGNV0j6)KZ6ls-SYnATmV3;<4z1YEF zQ@a}@g^#W7@Q!Vo5|L{xdzKN$Gihfr*J8i!DGuFF;7b zF}jwQM!^0z*wlF{N88do^nCp391$CQibaN>9`h4Rj&|yr`LIiPFu)ilCiEVcUSF#h z>)ER;ljd^;rEN*_vCy>@p#wy)SlDg7)r+l4r>@BhoAm$gu9m#IeGQ5`PtPDK54}*Y zI+01YmR7|7;G3jPMzPW{v(~7Dm;#=jQUq>dS2gA;nYgwF=B2hC_SF>IqoGZ?V5$% z)c&EHbQbtNREhxvytU5KQ@MFZS;KR`G#~8+GctLcECogNo>o-I z>zz}GDR!(ixv?OiQY`AhmNe#_Z%xaD`HC7+?4s5)GiwO3}b<{vhyXf#O&S_{TJ)N?&k-=&$cY~&;P&=O$(&e48 z2u4oXWMI<~CN`zF`ZajR__i!g8qsGsU%F9U*~`9U?wtK-O}aHcTBCHNE6-J?)kI$6-H_zkJ8&?@sEE*$}7%5~uc>{MxL4`8tO;!*-VBltHgG@>FGU&Iw zvXwi-2G?MOuK17>WLDdKnCmiA;{_%`gsAO1c#^MjbK8fd_qWF7`1C5%Fj#>SkM-Kh zG?2{<#*0#h6zDoT=#8xjeTcAnyKJkE32IVqzks?hsevOPAJZ^iF+p`)m3WIlxdb=O zHP^Pz?foz>AnFl6)!^NCuWjXlwU?5a<+`Z!^>f}Dx8Fi9dvRN6>=a!al0SL9&F^;6 zBc1rr>XAbTEYT3>WiQ5{teHb5A4Ww~vdkBFQ7R7R3qmT><_jDuaPx)ZD)j^W7DgHkAJx0`@ zoy4UM23OO8x(B0lJ#(xfn3dYJZs0|)%lf~Q3eT2m-&RjobTAyj!`bgTJu2@Mt;P}a zo;u;bN6(CYR_uuM71-({)$o{&Jsf{m^4Wuo_y^yu)R2W5 zTAd}9a_#oGId_c~XNG6gFLZ>?8J0+UOJ(72eu_{S5oeN|5Q^N*8{g2-*~E`Z2= z316u%Vsorzzr}~Pd?Zi&NPZ)|Bec=y8+js{uTxBjPJH{vyagiJQz1H+!ZR#ZA=Pxy zJUVxX5kNr`fHwLa=Er6aSDp@k>p#!G6PODc$)j^^Yu9GmMy#)_8)#NJRE%+6_?EY< zSiDTySuEJwl7hY*^nciU^LQxV_HP``R8l6XBrz$a&DLTn%T$t7Xcu9WN+peb9dps9 zB1_68+ayIIqr})pvQ)A~24iL{A?p}pj4{jgT-5!!KllB;pXd3#p6~N}{r>s+<66%1 zIFIFh9OrSlu5+1_=bv1S{xJJ$s&&%#l52F+3m^IRi&4F3+bq>fTR*(cH+{M?FV)d9 zY`$w#@QS|6HD>+^EAs&LuMbw5pV#>C+Eo48S=*L3dMaAi4U(_bc+xq?43g;)&K;ai zAH(K|f&AWQVACapmh1;roe#aQM*UL21(y-qWXY~ITSxs|4IIGZmk}#Lqss_1=y4gL za{~QA72Ozt>WDyHt!eh5Pb849DHBRACiob+$~|c+OLx7yy+iQ9_4uJcQvQx7O=Ib! zGM7I<*NWj6){qaQ#}C!4bwxc7k34Ye#9_knv&KIwK+a`^I&c?}8a2I1W7XYCv;B_C z??m1z-?R{o3^}pXc+t30ga%=GSL9Oj=}im6Z;hW=x(eByx>k2lg_*SFmW_Wd_g`54 zB=T0prcG$%-4n-+7cEMCPFTMD(0;)tsp^=C6H+>weW}lN7kxF8KA!Lo!rLcwjTg;N zbtEhY79aXJy=hhWEzSwuRmk2{sYHv;T-kjI1y>cL^xc~`?sM&VV^Q8wX`djK|DaZ1 z+EtO_D$}_!n~o^4=%mO7Clt6TF2%U_ZrpdX=c`3|XJt}?RMCT@7-?@s%1xP(joA!D zr$uM6Yx9o-7Wn{k>W11Ml-t?VQAS|BO9Dp5T&?ukNbMfeI7kWEX#jZCM8OJeQC>i%~aLFFHt2AlrYpPT7QVESLc}Es&enDUb=ur{9dH%fG;;UHoLH4IrHlEx}>!6v!`6fcHPA!*m_bnmoQr5g%;gQ(px*-7vcBh^(UY5YtHcY zO{$<1fYU-8#QMnpO*(Pm#{4SGM6 z>NO>qKYpYc5cpZ8xqtY=76Yf~N9Nq!3Ut5khQ_XCELSz(gqmwx>L7yC77KA5-=gj~ z!8t2m@0yyXt$y;(NUH=kOkn>bEiHqV=8!P6k;K$$fuaHRmZxLCu>K1nB`>oagI0P{ zFDs%R5CiRNs``I2`w7Xr&a0xuiVn8#cRYUdZsgefy4-gEb&vIvzt+pOx5Xrh6WH=M zndyy@qda{U?&<<07pK5^=-V-j5Nnfo5vj1Nz!p?6*5RyA*I z`>im*-CY`VW9r#_gJ$~MOM%W_zEX6927H-c6M@q+wl+Tj{l1{49lM=&ge`2rUdtA< zhWoy@WR;eR*vIM`Kr`0O)qaJZ-$gmKjE2D}+6YC^$EHv(p&`xL7uYLe^BlISl+-}Q zziq>3BlYJGe7Fm-PI?FUb{Arm%-Q`hhR@tTn6 z%TOlE{Gqb6sO;n-x~6^05bE$+!NEl<@mGfU5SLmel-*?G&G%#B_t4`PyiZ(6`7=H3cBf7fZLo7LcLV+AQ?*}=CdU(JTI1b5QQZ` zy?l7I+!vUZ6yr#P&0D8GS+gWGbeXshKpL@1U{T}I){_hjRzw1zVQ6~t2_T-_BB7Ba zqI8l(2-0{{J0T8i4j(OY*?c1(Pw4Cw&oJCieOhX00_i7RyN{s9V#SY0W(~Z zWWtsA2~QO9*~a3ZknhAOi3-8f5=PVAfV=%xkdQ^3Q7)SSSpaXU04KRH-AsW5y+5!} z|3ElIH4@J`b246jIfw;$AB4;9R)Coys9W9I`c5(m-ajMSg75u@?)<#8J3X@p5~J zJ3uND>xh9FYhWDqA*VTY0uN2?kPKEq!!W0Q79?sO<^yWbBpEBFYtlty?!x{$ID&jc zo+XfN_G7~_0!tI-5FG#=E zN4_8pD#C}M9q?f|j7hhjjIj?g4iLO*AZ38TL5S5rEVIp;RMyBW>(IyJPO6AM7-J8a zYEY9)2|=Dy%Xe{R?&iLJI7!P5tsAvzsj_rV_%(bH5`>ln2KKhcPwZOZvITo;vgpNf z6ks5n-15q18!k|d6g-<9Vw z)Ox0ceC=FwLE1G7ZhY*nyHZCT$vIx!su2pl9S?{xr9pvq@6%|b1AsGW10$PQ!ib-8 z`P%w~oN?}yKyaBsZMvXR<8All8t;3<@IV=XI2Ou((rOJx6A&uabbx``%%HyVf?Dh9 zbXGS3yEdQ=0!wkwcFy3Iner%R4dmnN*Lg)n{QVsj=UbRYu&9dv+Q8PF$=g2DCvbxz zfwv{NsxVCMOx}cKJ@qV;JP${G3Z5V$R1O6|Rpn@=4B%GS6x#4p&bf*Dn6_ZPS`hOv z`fNzA`*1nBHH5qwcj{f*L`VqMjHjk1aqmK9mUFJ04Z#vL#zVckhAAh(Isl<^5M8!v zy7zon1_;Z4=)-o4|y`dqfOo;Kb){)-wd9|`Rq zuQ}7@w!{iVp45HqOC+i#{O1p8K| zCcy?NnT#&SQa@+nKGN{7=Hda=0uYNao=Jp}5#Fp5#kw0~IhEQDGK7enq{ z4S%cwG{y)1X$?T4u9~hr-=(vSzd>?;;$1FH2`O0yED&8@v0IHIFS@Kc{X1@OYy3n@ z3PE7abnO3A1>EhTe36GpQ5H+u;`6X+g0ac+qzt4TS#fecTi_O zk|?ExUsORtzkmAyNotdhzZa^r_s@NOEtfwdJvjadPq_ACCU%!B-|lm@bF z*agqwrs>*(@AifV8P~1{Jpi2S11L;e-r>o}ycM$m``1+QHb^Xpp~a|U*}lVdXYkh< zQ0Q6f66qNb9gbK5z|LZql~gcG8*+TtoWqUvJR7?0OZK(Bh#Nag0$NXHsXdVBRsYfS zb6MwGV~F4wU3%W?eZZ+<33lh#SyXY5UTwwdb8^FuMmK^V<;d!PT6u0^#lbn=hToZ` zh_AFRl zZ9%idaDORkk`ldt#3#@3Yr@WVJSV@^vG3lz@me2V4ck~(3g0>}huKmDp_Y`ZEH3vm z14AAnmLDcpcyarr{XBVQCyYjJ_KJsLU#culhGUu~HA$ReLZMTvx`3ft$30oWPx0)n zLs-d@eIy)%HHrqLcqV`h&j~+*JoORg9nD-|! zpEw&_&}?W3b!J1uqj#=sV4jeD1umcKV3IIv+{Zr&roUFm?hk?(R|7?pYygfy?#wig zRT?P%ZZ9%;4!g~dn<70ux}ZQ(?A$tQav?{GfQICM)h(FcHS3`STR@s{RjRBg0Fo(} zS`1QeAyybO2>w#c5>&Ygsu;y#2TQsb!?6E84dI<^QRM*|Gc{6+=OV;Uir7{u1{|fB zSqmIzGYfikFlWvK>kUx!0w|JEN-PVLAj&@liI6!C!5Fk{Fy>tFg;^J>=#-;S9HsIF zD`7pP|L7sjbd;_(03AXQN+t<9I^_v`q+jo4ez%@PX1angq_|Y6EA+>L=RBD#IKyo# z|0}~$XQU=WkkjJ+QYdm;ISKa(`wI>HQUce8BbLwR2{@_i^abLADGom9UerFkZzRQ+ z;~SiB7mV&@OS#hIa?}dPfH35$If!^NYcK(AL`P|6wi0aC88~5TmHYiqBjP5tL<-MR z>Us+@YNieL;flh51&y(C<4z)j;QV3a`g4&7p+82S*C~(Wu%$Zw;tfM)`v)>*Q=-2# zvrMP_yiV~f(ad+o(N3&V*EC+slGVV3GpkIAePodGT*ep;VoaeS@t4pB@)&!H>JZFJ zYZU`mrK>Z+kUI#~{d1=FQdb!WVBf{cxrz8T>1=2AED1BartF_juwIt57=9`;BrpbZ zVX9S*Cr{3hLAU#ewHVl>X)@MwwpaJbtbtUk27OAUhT-Ux)18aXVdQQ}rVoma+Ez}7 zoih6nG?CMF0N;fo)*E3Y22Wyi7;xHkla7EE^?DV%FZlP&N7vwTN+{3m%tZ43ERg=jU62hY#K}3@`6E|TI|QU{}&xt-Y%J{-34ii z$)liS94sQ>5n{=De%lg9^6cR+O7=UIPO|UqSug($rA_}p2~$vWbNmX8M9Wbr|I5!z zCrkm3J^x=YS_mF^git@w;B(L3@jpI#j;r5!eTUx4^u4`cWIn2GiQ3;e8arbA&ixxl zxwSXPgBe}Y#UJPS%=>4s%(fn8IL?OHoU@hxj>Zx-qBw#*)%OPWtT7nz2(eN+7wme1 zScyVhSa*7%`j+neJU*kVTMdkkK&+Pe8#eMt)NDY5^^Xur3;qs;=3h|w`5km|2@EQ~ zDMkM{mGe6V!3tg|Rmp@So)tG3bvsWL_J2VTT1U> zg119?m|HOoKBrV-=YfHb5!;u@tF^KgSsK$VT-)Rw!KNn&ZB)i6C&-(w!O}=FS|$m5ARAm#WcN%YHLlI>%6N zi7CwN6wC~hcfm9m43CBzs&>1JUAyOasls2gXL*6Myzc#0ZjRRuq}sa;h8Mx;C-C~_ z_4#+qz_G`O-3u#Y$M0)N`)&r0Mc1HW)e`^{WP< zXvB69^#p+gC!QjPD9{tQe%>j1Ek!mCu}PY88iencTDbb+sFAYp{seC*m=bwQP$3^~ zm6L-&EWF|OiM~n?vk=rvN9ZgrD14}JzEXu*eSg;hFy$ped&#Ei(KF$3TbSeehr(BY z(y0jD#Y|k){SCcK@J^Mn>L42~k^6KeeAV7rl4GjBNsJw;?yLTsC0VxaH%T+h#e9}z z@rF4P@c4UJ`ij0;nutF%wJ;l-S(ujEHk2N(Rn^gJPeP!=Zf_!<1i(U6y(A| z1rm$}J#*E&@{(@X@N2V;q&&$(zNL+J|z(t6=nN1SYl=aq&N3Yztm2MXU!E z79-by=wZZ9%D#EX4YJZ`%9X`P)=Cr+{(z_y2X#V30rCH#9c_aq$6CVz5$nkB~L;+$5 zJYI_!oW0r$=I{{+O5`SFtTg!iE4=r}&h($8s(yd5?d4Q9M zqOOGmVZ!eS_~$={U}~Heau-5UJO9)t@CddN2jflBW%W%MIr?VmzoI|2{pd_<68sS-m<2xpcYRuTy=)`!Vq(Ltcy zI^+PwO&#eVtstqK<^hnsqr?-k3Wvs(Q^6C12tAoHqu+S2f8$Z}8xO&6tp3!oe%B3y zAJ@YG`p;oCyG=&q6r3cedSynG6cqBj^sF*S5Z{A%1C9$}Ls1)HLjflO0FG@&V*VAX zG>vai?q$~JJcRk|_BGE@OLMb!58Qy{lwJCK)#-V}M3@G)gBs;Z$DON~58D=frKVMtNu@B{)*TASFu+9cry1ro3ZkVg3+_xmK z`w*;SVY7^9I;b~$`QM`4zKE~KB(01K)Y9eumf;}xt@Mu!nv5rTP6lEuue=kCJOZom z-yqz+C@372j_ltr_wDwq1Pr24hWmV000uFa8|SQDprwoYt;zp6ot~UOx;Gv6uesbe z&A++(|LfbG3(;0`-%?k`nf*RBoYLQ;F4xC$z@_1 zYk(zz%O&VhxIzdIM@!NHp~y-oT0n#ZY+wp*-j9c@gM1+jBqT`$@PK9mg%u=mq6+)d z+3--WkSeJon*rhkoJ4{JQqaG!?12(2l*pIt0r)7Eh{J|7fzPaD;PV0~iX|HJg~yJ8 z$<6F~Y@a6d1Qr^K6^{=n`c&NBe}AW421 zR3s44r)o8egj+g|2x4DcJr;-t_J~BLyuP1YrEVXnmbyh`W<1qf94Th;GuXxuZ!!ar zOwAn_=@JhK7d}kS9wz!u0g@qX{7*$J4>%KTMI{WSlkt&OxGMPaS2{VYmal1Aa+KsN5EJRG(#4P$63NXEO7;~dq4yUg2X5i zREU*y3$c=3k`)f%_0m{?#0-i9gaYhAoUxZX#09jvyCk&RR_HZ`qJZ(~j~~-owWa0Q!5ef}o(ua)+{tQ+k5Edltg-3(AI)7ov9PRP5t4=z9;I`GmT>#d=6_VdoW1%qTH~R4`I&6F zlsDleS?EtH%i5ANZspl>!bb`=)K*oAo>8)VgKlW;RoSg@dB;h9kgr)ros0IfM_x5g z0hi5r(OJIav=^$iDreo}t2yEE{W`tt10o9m8TXX>TcWT<6w$HzU+om z@>j6u&aK`kcy8gO6WL)^Zmz^F(1N||#GCZ7;qL+Wm;D5M#a-=@t)@GU1QFGn1 z2CJK1doS+Uh;YhF)oNd|_l1ksK}y^GWg|DA2Adx*lWKZqeamRwM#pcpN^9fp|B_o8 zo+mgVQ>nIAQTOba+|pyolgRstsA9QWU$l~^a{|{+$viZAdBN9DSHU$aP+^q`gj#AO z;FkI=nDuMJr5x}bJhx^)`ajLD0d{Hox!&kwoVQLef4{K{rwfHt#qaX9k5Y(U;D3XC z_vIVCMh1PLS@luh_RJe@^Rhigaafrb>uJU}(>2;xnE)I3H~=5P!brAgAMSBmrjAUnHJNlh=r z8IKIBWn~*{t)v;$YVM{6d=L)K%naWyEzNAU3e(ZF#@Z9?6Lla`q!Ng;%m!Hwk|JLo z&%=G9dul(=|m7o)Um3~Q=tBAwI21XY6+oiOfjv1Xwi!MM;t9vW(H zr)3JAg%b=T2AB&p*M?<=MbfZI4g?#cW)DPqU>G|+j4qw`NIGbb>W&vWnjkeuI78_> zMYNCT!8wx}vY`@H+RQZ~@Ig2_A^JG9N0P5rUFW2>4UpVsQ3+*MlH?nm1@?NHfiaJo z04o8Nf9x8d^J*+(q>^?~lw)a0YnZ&;*_>tYK7L&!fMy!^HP_albjs`jV*{LFX=mZg z)MXnHHa)CC2{7!ix9mLAC1@v;vhgy3k?66vXkTH~aBdaadYo5Zw^Kr^s={MfYlsE@ zjlJ;9xq2l77LH)=e@UE^ zphK-_penOsNf<-74kI`5dVcE$cumexe(k6Tm)|u>|1ojGYNhWAoV?^yPwy8>11&eK z0bg%y2iR8sOn)&v%?-o0ei5Vt@pxj(VAVh-9kMr~i|6_JmL(>!#DNpyDHe82f_^4y z=@^RUI9=kcvcVo|j#Nv{tob#gcNsE^e3qrQ!v`c~#Gvnu)&TseWEte;+D~rV($){2lKH2-JUTN)8;Pc@G<=o=McNe#R zixZMwBq(Eri|OB{tDJw*Jnw^ob z9J|1(?=i6u-P(9m$-ie^sJ6$;6FQpqUm|%mrKf4NUET!_^O1misn>1d(7Fb@pM_y1 zZqcCj#8*>?;?F8d{=@6oc0WtQ)~uOsYze($ytAgUdL*AWlJD2y(|q;F_ae&kXLoap z1A%AsxOP>;rzA%I6-t<)d$fttp7(A(zQFg0(VAR(=ZL&RXaZyZ{>~Af{~!qXPm(bD z#oPd&0a#F8QpC}OzFBS!{rg)_nlcUw_I#dbHYgq(U1w$Yv(Yr-J&9SX?hV98a3j-w zeVPsYRBr|hC^XZT%w&WadPWauPgIyX6n);RvZgXz6vYxh^A>zRGTu3J{u_cv)3(HV7!x;@(fic zm%#KkDs?f$7o$|0-LK`Yw(OMTnkR1hVZ~lsYsDT)`v-P!x+ll5i7n{aGT-sNos-$? z({j=7fk+{68JyW$CxVtlj z8sna`+I#+`ecsgo{??r}qczRNg@dXk@|aTk{lU@s;uh27!q1*c{@v?z?0-HDEAffO zXiv17G7CQkD(%@lo|1v8BV1*+O(tih^8t-SrnsoXYndgRm|wTCyK)pP@5v$tEP#J> z&8lD$P( zzAa=@iII-EEr6{_-HH7|b5gldh%(}&n4tIC-Yt5j&Dd#NW<}Tk!6vEp2TTTZUczl~ zC5^&Q_n=?TP)7U|CF9BOp$>vZ7j!_c2|nmo5~`G+a{KmL{UsN3*XpzGyVeui#*TDn z#kMp^ge7%+J`r~@|LbsC-sDVpbLRkelUAJgO9N2}2`xVsD+D;OU zpd2De;%nbVd`*BMlLo@CLR9H^3TQm}HPk`asDcg{HenNfm7-MFAl_YDnt*&KICR5v z3Z)Wg-ebdP_PWH}h7{V=eo#x-csrGgJuG*HI^E7bU`6=V7#eXh=LcoYxnXDMerefH zjPQjlt=Acf8#TsGg8LkitIslpjUV?fO_=}AW@!SxQr{WMSs(wRwEl9jrg((rHZ@Gd z3U8~HU$z}`2IBfzLbK7Zja0oMlYcPZQ?v%KYTJ3ycc);q=@)Oh9ed?=3rY+E7vNCi z8+*AetxVg0V`XLkgPU<_7ixBz2By^d@N?`3ymP6b>mr|p;58%H-klH=d!4mY@aPo! zH#|>n)iw7`2X?0^6sLc|lMaz<8YFruum7LA!^+EK*AfHZ&E}4+_WAS-@aG=hJ^HJm z7L_!AUPSv@qa)qK*LyM|+Lo3A&vrZ2+<1_t7x*GmLy;AA0i|129N52BUmG7=vBcPO z!Mc0bB%@cq9qKx<$aj3kq%WfRzE;Uk{`d>M>3iYrRp&RDE>ZS*d$I)m1Ko^KeTF&O z9s9&!M#qx7L>b8S_I^@fr0K~XT(6%rhTEur>0AD()w%2sM;@-;K9c*=FSV-kd}~38 z%_7W+EZ!2?W`arejr=vQ+`!6C>D=}C=D*tit}s#V`F_))vo8>n#l#VZN`p z49y;QvZD0p^UOBe(Hh3ITq-Mw6I+E%s|Y4Qb=D~P@vVEGbDn5%mU)k{-k)=zCcgW6 zzURgcGOi)Y-KG6RJp2Bg;f6w%Ca5sn&_g4o>P@eYsL8^TAHRrLT${N}n;a{_+t9IYIItJbuYtGOAq;vm})A;DB+_gnV9(G7Cm^f<45w1Wz z0BFLQvN{dB&%;9f$Yv3{CXQFOUY7Q2#@ub&`qp2SUMhszr8Ek1gDna+M5 z)_n_S*=cvpb9Y>hRwZ3jNE6%(x4E_Vv0MA=N%Z?mmG7gcFQ;BzT&C_6`{=Cs36pzg z6dqWc9)Z-4_MD0SUhMWX9Zq7!$1Bb#u%b=?nd|u2W|-tpP-%3(IXwDk^ZK)^EJwL!e_($0%{CZg+RJLkgzkg0mW+ThZ;(I~$a zsW7!hL(q0$5j-p;ytI54MBC9Qx4hYk^=Az#$vy{XfzRzw_sTQ5_e1`{9Jl3UpPl?K zo9wE8S!E{GTq{#gJ!_z0H~Om~#3)uFQ?Vd=XX; z5=Ef$orK%l?53KEP4ZMrpH*|L(XB8Qdv|==*ww{EbMnesAG@hV=frPN52hSa*?!pGBqJS=FbI3MU!RdK34i9Ks_xA@8Cl(>vi;D|kyqKbTXsDO7{X0H>Ei_+S*>8m z)BOJJ(}(BksV}pmTTTJ@YTiXe6$NCN&H8P<_p6h%{X?r48S(~Fj@dW>6)A@hD9OF> zn1ERv9tU^~#Qj>BkqLkSbD?q4dW*N}%j}f$7=ybPVbn2|Ne5CCKEikFj>#EMMLaG# zbkb_ z)jDfFFuGtF<*w=lunhks${s#L{o6|Oy@e)mu-!AM<*o{F&B$yV@Qe!Jv^0cYz`w#< zV1GXAitoa=cNZvX%$|yTLL1=>ouqk0?hSgVL-l~mdM{T88tg?L1sD#Ki zI&ZL~IhLH`d+Y9FpU~QS*FLtOH(Zn3Fe(q`DLmHK8H97nG<`#<4WXdJ&QGGTL(xYzuy`HLJ#fhvJLp3R0!g=EU3%19_C%)IgH@D{l zk=%uYS9BP&00H}p{IwX@99(TH9!z8&=VDYo`}^75t8v}3QmGT*DQ*)LO{%uO^;6yAaII?iIOoXU zX(=f^kIt4XS%Lr1k&4>7hJ{nI5)5C29QlhUJT z%lUGgBl~vx((CCvX9?R+6Ao-OR^DQqvVydD1*!3&)xC!nR#&SuO{z3M^!$z9uLFIA z$lYaeH0n@h@)Yv>RYr5!fz@vb9hk$Zc~(N@?^k)v#E_k~&;?^8keg(W|GG7yy~%68Kj;eIE?ivXSRyyy zUKdP)?|{3D?LU{uDHlcgD{c2u=W1X2b)er~iktSWSgO*Zvp_Z~p}<2?7vny#G5BWB zcZ+?D%C`wp#SdIC(!PrPn=<1YwV8;Y7M&%sjR^$-ia8i}{>ET@&xFN3R^@1d6!pO{ zMjBA$<7K2YwYv}q%g%DyrHKW%6m@sIFVGBj>j9Qo?(449N|gHaz-6~|s3PA@W~ruj z4?@GTvr_hWV!=bjoZaq9n!)Zp+b#F?R=Ori)jSy9Egh-Icb8eKsr?gi(6aNhY*b>w zV@2IP?wXpx9z7>5_w`l2O_ZvA;Ic;=ROEZe=xS>BBQ9BXev@rXEQnXk+2fAU4EF5t zu-rEwT{*k2QaJ@)WvT%G;KN~faJu(8A|)S>JS0u&aYLrUn+iQPrNo>@tdL$;?Lu%j z7`^hD%JSy$$X!CO)(Xy_ohJU-T&{*GLZD8$+_nc+z^z7(IN?-cz%WE&;3oZ2> zHU-u`ea|`B9<%>cBIThw;g4e`Fj;^+yK&by$RTEyV9& z7WmgDC2(5n&W|y|G4M(T{*{s-ZmbZ~yCjj)`B53)UDBsk@25DR*v7rxOhycgpz!F*x3$)o6v@Z6eD|nj@)JKNy*RuXNW7N! zaa()69a@y=J)jii_CYju4!tJ5gzH=CFI|g2WiP?B?}_~&vI3#LKA<*kn^U~n8X#dz zG~`IjHC)rPu~t$*lL0qO34gJB<|e<@t_!w zO|hRUJP7Bup}hkpSn+E~u~_~Dw_Sjr{Q%f^JGU>g%utjgT2l13F1k~cHec3*^ju>< zTQOXtE$F~TS%Gm%)Ey7fadY56snu1D6o%%p!xcY`)kkB(6E;xJ9J#o8`1;1P^&hgG zFCs05A8tJR{X_P(i>4OCZ#JH7{gCZ)@vg=2*Nta8K4iOItg;v$T9lccmAN&mX#2M_ zdu?bxR-CoBv9>Yx~YZF_{IKtI~(`! zxN3g>a$ukem~qsu=i_ZiVIdX^vW4d7vZjK-(rf7O+zs73HJ{}_&3xo~Wa7Pl$+MVk z2QRz)*pqqGqcJ2a);i3Ykr6j0`&Rit?13Ab%vE~bYRsXUJg~-jX z%rdIVvUhAvc4|$&&{}pkOG~d%ORrCR_K0~<`7a9v|3-zl&XsWq2ZKFSJYyCfEA%{e)ART7n?;3QVVxdEw&tgPO{d11)0nsf z#Hq(|E!C$rHs4rl$gTt)>&6rcHW{ao6cw{aV^K z0BsnKPZBT4C(Mm#kk-Cm5(AHDSZ(|_k5Tji-5U_5A8e?i*8l2RSZ!+-4em{nm%Kl3nDScl;WrX4`Inui(SH zlzeH2B3i>V_~oTD-r!3WPb=^)V&SEY%N~3?*w2!P-PPU&Mt{|P07>e;G;uJ;D)(=f z?;T`O1%jy(h=Bo)T`^SSZhBC~qS`DH)KQ^vs@URd_{!h97-~P_Iumy3-zhAze+3 zOKa`;r2bM0SZ9K2cPc+Ka%B`KkE2SAknTm@nGYFWrniI{(gc&Z@?^4L7ojqyrpR zcN-o&sJ`H3kJ`HjYutaX>wWvN?F{mKvK6p2$HOP6QnJG$%@|M{{RnXHGq(9#6zpzX zrNQ0vS#(2iD`&b#U9`Mxnyew#aQ-6WPVn#$eN`{3aIaslBuvonzj1JRx=e#=7rI*W z*}QGyK3O2 zo_Fg}$z{8Z{oQBMfO)9ce*ay{ebP5y%wM%!LG5*3?5lg_O}5sr`$|y>#y**Dmz}dp z3GOo<_E||>U5^`KE3*8bw|?w6xTHze~@}H)Oz$!+Hq2sDgoOwfQ zC2G|%_ld|e(sABz?!4Q7YVpHLyGuI~!QJs{dX0~HlN`4@j9V42^M?r|5ZZrvh0cHi zq;Xc?1m(xEPJW+jMTmCZoEXL4*Yc{HJ#y@d+xC_+j{K7}bMbU>PQe-5)B7H(Wyr2s zzCpHTFVFM(qMMH&Ark?MkfXKYHNzwCKBnGp^Im59+@U2+;2@>Dj$r~cys1e$AGFWd zcau;n^#rNoI2fF|^JjG6;pVUUf}T#VDZ=WE0X4qn@r$bmkWymJI<0%s9sLUuPZodP z6}h)JLXNKc?33%6y(qDV%JpQv`WCx}!hyqytNtG z_a(pK-8BY{FxY{b8L*%RXkWLJ!n*G55TfS!1bBJa)hxdHWSw_*W+%M2-3eLI!jn}Q zeLI}x)Q*=|JRj(H+WVuh=;Z^ms9Ps-yEtL{pnY}HPXg2;IOn7b7bQ8hNozk|j?Tkm z>8;*38CQ@~tea0`d|v{{>CfAS@`?Lau}|%tr(vp^fS?dUC|za$4%Do{9l-lP7W1amPY0-kDqhbZIyG#}IPiVhBe`kl(pw)}Tifi`;ps za_r&F$@4Nhn&YrC$=3AGt1V7mCRHjlj0WVeg?6=N5Asl^mqs1~ywbbPCp0#VzUvrM z4r#e#z%@Enxq0Tu=*{+XGSe$J8b7$Ypv&Wls>?;MUbkCsFflT2srgpP(lRf*eafVK z>|Wj(FVuV7_2NXKm10!nS$gbD!mY(-*`Jyy8T+-%3U;f!rz->s7{k4^pk+~-XZI1q z=5=tcS=hb35`Af{&xs`9qy3}duTII%xf-uFgqtWIl(n3>UrL34n4)L#_Tww>TyDPe zWc2bf(4b3cpYFV|gGcP{*spt>RIoyD@R(=gikJDro9)&vu3I5ke{9LTt1?&HAA0nj z56i+UyUn*4*Vi+9+Aif4_OM0o4q9tzwVv7pFLf zDAS{P)=>mMeDA>kn)~h?aMQqrLA`mn&C&Z4nPu84jw&xwz|h5kYx5w!61ccH}qL% z?0(*}8n?JW>s<}lyO4b^0PP9ge>@(3*h@2|%KWAGwLBJ&kBp>;H3gSS%HO!CM&Dl4 zR+3(QEFo0x@xtAklbB+00+$;TLnDWpi1z3NWn`^dsL>exd4EM0;IM6?_;BtW0w?Tz>K0jniinQCLfXOk2=hV8*Cd#U?>6e(D#| ztvqmP31xHShQl{r-4n>(&G{zf^6G6!_AaTtz{#eG#Y zUq)-h6lIxoAKMrda`Tb9j9JvOU8^P9{{vt^pTEgtl2V-g3R_NsHsZSQzjsiFc7N1$ z3i_B*bR1NA-;GSG2q|LT8OJW4QkVW*L@ng>R6q+LN{)B47wccaijBr={>sQTgk z^$i=O+0o0_HRG6RV)eH3n>rcKfqwxwew>_rZWd?HuxAHKDo$5Fh*gE%K}@(ol|HZW zYwoseoC{=4C%s+!!ZFro+#{?{GEjL zblgh~^ZLps@v4owkFoqrl(`O>Dw~DUTvweU#uFW70vMbVvW+d%Qm3_n9<#e;`+T}Y zW`y$6jQMWqg{gkn6K`TBYkw@jtKABhq-Ow}G!SULzzy$>1OE4y4jLPLu)#4uBm23x zxuDNRu@KHsG%-)^QFDv(6n3J_CzJ5eD7tVr&(PrIn5NqoiSrMgEydJZ-OClJ(`^-+ zl+Bn`Q@*Ol(%4C}`fe)bjRH{_VxN&2W)Wd@nbmml7@#}ebH?ckr+>K6IzQT{?3`I! zd&P798K&RFj#}tBZIMRuDN9!Kv`WVIqD##L&%HJw?<6|Kxs;-;s;+Uzl6A4BX4W<)1}K?=Z_+T&S~m#RiLr4ppi$>C6I9N@BIr`-)U;| zphf+v{AC12^M66dQV`{2NV`iA8B^ja7Zlc^p0*aDQ6$jDA{_`G zkX2VbvB)F!Zy_^&2k0X`P>T=!>_YkGmIS69bJRn7X~1 zbX5nAI)9c6rzISzT^*O+E!xZ&7nR{_%c``R8A`8T)vm!lvMB^qs3kZ2sLYv4zVu3w zMg?%w!xg(S|M6$`mTScWjX>u%@ih+gs}z_Loi-wyfhtR99UA7Sm#8pv={f;xwD>3# zVf@xV_@l%zdXqqxB3mAb1syLdSs~GZZF=Rp1e9HTZYpCha@}m?tp7`zpR+|)l;rg zuv3;qa6IUEC&DMlb_^rrsgWsm%dsTSpb7P*DaTj`)f@l`QTK2%oBE#P0xRNN2NS6| z0e=VFC*ioKXM~S{L>Bz}YPU1x%N>InCQX1L^;frO6?ep7_8^l{;J9@m`0dtc?LM>t z9+VznEnNEHqOwgJbC+xEYmwrVTr{yQIA4_9%J1Z!f^fU`L0Cz0)Oh( zlkMeGI-9F=S5vU_Hdlw0IqD05Z>n@ykKZlbR|wUr)M8hAbwWxfMoqi8VQPi2G|z|H zJoTNxH$~D5-19?Id&8YXp@atSf>1M$29&m7vouxrj6zwtxHwHdz>UxG(hVhvc|)9km~%pVbMs3#%UHpVp{}9r(j9)tUqtGr1|BqmHN$wvyw%s z!DQxto=BUhVH!hqE%i8HTuoIJYGGTQhohIhSNT8Ke4n(ZlK-8{V8serzJI(#bniB9 zp|+lWv!MEK%aK$Cs|E1>Z zm7R*;2C+JsQkeB7m}{I%^KGlZn-`>pISaYbWE&3q86Q!R2IY%`WJ4kkzRckQ>dlaV||)Mt?h1-zQcl+B%hnFL^JOb{2`N)uFaK;p`Ng-=M3edP-Qk z(>`Vx=oc+NCJ(L~k!@!H;51sRw|u3?eQ@YidO7F%)_TcnQ-b^6N$*jPzekJ4oIBrK z>K9u;nff!WTDTI<2nSWSUm5U-PQPQk=bhBN10wa|0-M%CgXz$Qfqx$T@VW^lp93S^ z5aL0`I(XOw1?q>FO*lDy{TYyQ`nnTVE|W2t1&vyjefEwhSJOrJVQePXxG-5hrQDcbXMlU4Z6Qsip?c*OIYe1Fa*3e6eQ!ciN4(|hVv zB!8D(xA7F3&w^GScv&8o9+LS8<;bXx0l&MZgspqf-`^?>Y^$fQEZ$`>1!Ef)>pbDl_* zOPI#!3`D?X3pOuzW!QTkp2NzQmo^9 zuMBKN?eWn`qajVL^t8)LPq(mABMmoO?(xy-Y5QVMKAv_X+v&E+R;;eWV$@_`)-hi( zrWG@Oxdrs&R_%a#zjf~A%P#n@aiM2PNQ9T$CW2aH*CiSLud$40%BNf48}}ygGmoDf zuU@s2<9}s+ZPo}@<*ui$tIl2iHMtFHZ{Bv1RWAD5+x@BgV&f}^;h0(_6F0NG`Yg=iKG(dnecgpeUT^CNc`~D%9(UQY zwSQB^O@P;*?^Ilq3JyiIreqfq^r;NK#!b_&U!Qh5rrWPO#lC&2@LWS~`ma1nZg!={ zt1VFD=@-uq$Jl9IC^b;xsgmi*7f-b(x-w7O1!40&vB|~rWrwrub<4%G5W8DZ@;b7Z z`{MbkgUCIti(JQgPPZU)*Achwi>KP*&3_lqVs}54ubzJKf7RjQ@Up(W9qW0yg{}Sc zi@)OkF8F`FEsc5$)|U>O;AMRiRD;N>lz8e+Xt)Qt$>H@&nLSbCA>Z_0ZGn-xT4Wlc z>fUrvL0)%X)$48PvOBW+f~E*Np&2A_fqL)@CK*hbtYrSXZx_21V!EX83cY+6d2wXn-l zwn`A-y%yzO5v-=%v=OXH%XuQfHh-m+!+6-ViZ(N1msPkmny2p|hvl$M7(8_ct?Mx9 zBnRA@jGLpH6qzS-)F$R=T!6#W=vhFUy|K#z>c@QxBQ^L5T9h$G9k)i~rcRSW^F-=2 z=rdl*yy;AtH`_WWw?-awvb1~7ibLh8yL$@`K_i*ky-S5qdg>{$6^EZ<_J22PF#DU& ztc`5K@o$^m9%}M$x2h+v&GBwo)N#DXms-x+Qw5i@w$HG zhE3e)@GJK3Q_tjey~7RCvL<%ig7T>nXJc0?FnWvGQ)v_(c%{vXzL_$y5uY^rB?~@z zs&?>X$FR}~+MQs9POueyd4C-&`+Y}Bh_w5T3Q6)*F5iMb)$Gf5FI}-YpDIqa;xAQ< zT~h}<(>~pTIG^3B?{-7jQ2bXjqww}7pw-6)nx`W($+nwj$Zq;kBCB}Q*;cR@> zT`auXf>>ztQf(+3I&&fBeeZnnOr(3>Ef2Jy7%pH(R}T}j4W3{w?E@C>6% ztu;-cr~}P(9cA@Vo%LKL*L7E2_>o7RdJNd&=~P+S4B$%XdvzHIN^&gjsYGU&sU#vr z<&ZF*u8xVFzkhE;gsPqFsXIt*U8b87WNpH$eFj*W$UPi2b@>!kH){RTjljZIKs)cU zb$cg1OA)$WffmSNOW|S_lGt5plD^fDxlXk=WK`=k7ytK(2|6Lfo4QF)(bw#qU>Ee1 zszdu}Vap9YdB+YLD#8tCJf4b%3fu~SH9?e75fHd+f`2FCw4*?6#fEY8UhO(Fvti4q z4Ufdpn({@JkM+!1H9n1EY77sd-1XZvjXaGm^0+~XGK~vVICuBf^yn}PLkf+q4X7}h z@zj}9ni`m^r4jpbMs>sphU%>Ic@j@0G-Ujfm?aThY#rI(sGOz;Rl0Q}W}xb^#U4&f zYyNV?nJGc3eX*kjRHbt76y{ZJeUEHE(N0NzhOBzRWa>hCUnVMEZ0cI zDy1s^DS8acz0#a{)Wf0#RA>=P%?heOPcWFRzfxegRAjhE74gc{r8@T5g-5C2<7K5J z@sVe>E*cx0yV_RNC<4SfWG-0R2%X4_z1>H6d4DclPWhE7dAjIP%hiIyx>PscZUJlj zeq%wR0yjR{TVnrC;(7J+?L)f-jrnc|F|_*0#sM3Ych8`@?6jxTd$rlT+KFv%Ro4=| zaXnSPD>ZX`=T@~gPx}{bsn%7&0$Ptx<;i#$W37~i(KSSe2?Pq-r+x--zNAaa_10;6@;RS63dXl|yMNS&u%|y!Zo{E}O5%RY@U3I~$kTblwW*F^ z5#)F=dj~2;P_xaLR_1ALn@wZ?&5B5mu3lhC*weSi$FH#@?00`qA?eqr-<>oRk`~Qn z;BG{}8K4!ltt0##^E{h@{tMb-+jPpXIC67Ixz@R@H=H(0G|%vZ0Q9r#Ble$ZQh&Sm zlo49BqhHZmgh7$U$ zFAkmE-irtnpgH@HL~sm=DUZV%2+22x@|~tR)nmii`dd*Ca6xpyN%Ii9ER___vF37^ zj<0!I=K=+R)lUhAIe|JJtu3QGJAeD>Vl-f?XfeCxk4c=&mkf~irdM91h(pPbM4l!K z{LhOlS%6CYLe-n?qwwe#ML+e=vJVL9XP|YA7dAL9to%1lt(|W}S)6P5qt!Ql-VV9A69>zQl;D6g6lX|6F z+sIt4t!QoPzRNhhh$1+-qH9%66cFS(Z!{1qpf*04x(>C|IFB=1kQMH~^E}r2V2y3d zkcg*d=yv3U2q$BDij3NeWVJxV#goH1>djEw(Pd2%%P$ z$OUns+T1VZ#hm*v=RWUCJ?nl@o^`({5#LJP(Nbn&-kH7%e2Wxr9q>To4Qc$q;i#b9 z3%6Y1rmTWd+sp^mfu8Nd9H{stDxz}LN=3S@J)MdT!|d{r_X~nWp?|DdrCTxQ?fFZX zMA~mR#!wgxX!61+Wo|6gf1R-HGwD3oPE)c#dz_(rGw0D2Y|g1$@#)DQuR>=yPf(lHJo{E-4$VCKI8P^u-=%qm4%R?a5M3iU!7&14&5*4W z?K;#G?m;(VB2sdZ8d9-g1owv`@T=^b`ZAlZk%Fn2u%%f)sDDhj@M*cpn9DGR+tE0b z+7ntMpoU<6kao(ojj_wZ&@BGi!~q8s9Ui8xNF|G@5;XIJcgK8}@phRCa6g!+s1hD| zL!4HCHZ^N^8D_U}Ewe%JTOP{LB`&ZTm81rc4k&IJqY=Mw-hUFG1JQQmFX*X3RJ`NC zr+ncdU@mP#4YP|cvf-*mBXMakx54J~iNSBK&`4yBs*K6Wd zjQV>&!5*Unf9X_~|$$)$=+`?>yT$U>OlH3v*PmRkqeWhC2B zeamd9^)x&PD45a-xW?On#*y|%qp}FOi0_3oc}!ZUP=S3iC0a+@Luy=$R3>pOq83V6 zxF=Jgail$@z>Po$R15kQ(35fRA7+0L{{gj8m48_z4P{tEXVK2w0Im3L8DW1={bN4o zF)AMQWLVV1+->c-92z=r7`*TqgA9tfsptOL5-uEzyk76bG&4_o`&+G+0RR5Lc4Hojoq1B+NuDYb$|P6UQ+xa4R*|80~4)_>9qU+aTCy z4UzlEAI{4T5~_ zoiXelVAs+5lb9x1$T4;AkS}=9AT>&$%m>>U+wFtxI_9qyizLnRxB=r0Ae|BI9b?z= zdn4f5>x_UisPRK|#;$LOT}LiG|Ra&W1Q*(zd z2|(8w@d-5Ek-#vOF;%?}661?TS^*%v#?Zj50lH(R)^5Y?@~L!{VmeycVnQuLJ;iw1 zX`KDB;($^aab?(YI(bX&8+w6TMt|5RRKrIF3`;qORIZ~sx-|@CnpAL`C9mu_(mtX; zgaaWRi?NN6YNmn#XI}Um!$U=7Zkpkv zxw}tM#2dj4k7Y71-90EF$7%P72#=nJntN);?sGMEJvy5v4h)gz(#2A0U4Q=ej)?IL zaJc<;zy0dWoeh!RI<@8#V!_*n*k$oh6d&ji$xx~vu$^Fr^#w>EM+_vkDkr!1%z|OI+JF-Y##A)%4H`7mesw22Us41}ULk10Ae#Pfi9+$$~)* zj}qz7TIyu*!)`!R-(Uy2K7X06c)#tiM=A5~Huk7@po4zbUB6o;V8@NA(l>8uV>S-9 zFDKkZ#c9!n2BjWbBSn`n58G?A?R6t0m1}l9DmzXFmO3Uin0zCY~#XToqxyL<;_&#;~^SZ z>zks=>mH!?tljOS>L8xBZJt)XC6&O%=e_c@cJ*7iyJKnbdUE%>T!!~p zg(ZWf{G0)u-4*LKAk&bn0kl2Od-t&@+k3qz`hnxRbDVOQCGm9{-h-(87*6Wx`&IHF zSi1&dE~s|8b{J-tMSt_V2$nzR;rct*({q=RHJpXf7%OnN9v@L7^R>2Twrl8q5FOn` z$1o9TuvywncgJBeU!)1Th2XN8=I*BTb|xnETwbQDv$gw|-Gj%!<{RXO zc6Hn3?fVf9H}zWlYH|}!XO28M7J^=vJ7L;iQg;|c=_*|gQUke_Gqn3)yUYjIvrr=6wz5>VvZ z-x`n=kWbj>>kM`+m%$7J`;b6&Q~wG8b3wGvr)7wP7O{p0i{B*~pKkE@$Jz0K`ZZ9$ ziQuhw+GTk+5|25Lyq*JU-Q2Oz*#E%EYjE;n6HcymI-qVN6E%g91u*m!fa08daTJB)!PvK}zGAv$=b*Zg>Cj;{N-aP<|RF zux}Sx5C3*eK*#AJW%_x@47g2~M?L9QJ?Hg0Ad4vPq zHlo{EfSN@ZyoYa%?|JOH02&z91k~<^=`zZXf`3QZ45Q23Y^2&Ln^^=voAOeZVGazn z5ko1u-6l80$lZn70XB#SUd zOtvWvJCD^!(2nINJ{M&_dj*PZk$03}MYHAuk!qej>CEgfhGML%7+)og^1EL}oprR# z#D9mh_`cZ#)m8Mi40FjdK~;g?^Ephn?ruz^M7D4^B6T)qcWdWl&hGB?-oVUFO>KXU z4n)m)9*?~!cQ$s$xTE*3V-qVkc(LhhT&pO=9$|B{*bqmrokx;4?ujExvTcZ` z=?q^}Kq+D3QjEjedtr+sXKQy9JG$==dVhaP;(nWoPkOz9T0<}|NCyJ9jBy~@8YIKJ(rB@CxE-m9x!c-_RzO-lr;sW2#jH+_sw$KbRMZ(f6{y7-TXme%Luzp?;>rj zea{HHPT5-#%wiLb-g*c7Gagmq}nBLl5qxD+;)HaqR)<_?D<)1oIxnef_bo zRW`gGHTK_W${MtKZb1cNHoYdbjIhhdEh@0MYe&{9w5;!%ZX3acs;*1w{fVo~+=zLS z3HNSSZJUaMhTgl(s~ci#@6fcV7~DVUx0-hTG8tPV=qmc^x#F9kH%LA2AAjy(oZc+e z`Ne#p-ha2!vk`L5-1YvUc6lq|?LLw9WVB~+RE78i{{!6pC*IaU{1}S5x6QV{4`r4* za-v&+Q9c32afrPFV#eq7@aFOd^7M{7^m>X~ij#ObclZN;v1DL#~~(D9k)xTn}0?Z+6o7U@dPm?h==c~6a1Sq@{l=4E>b+S3>_h$>@lEK zmWBcT6ZZ-1>@4N5nC8!%rHLa~k2{&x%7;aojMak1n9?bfvtmiLBwO^cQ7#uE?vPbz z3}a6TMKJoaOw1Qa%F{4fK4+4~7`Ln{o*@Hth|LfRl0Jm|9#69wzJFC|8vW`HAoDII z?-C73!!Oihe#s_jGKY4-gnHIbY0f<#q}rLdm9%qQsog#(>qBR5IQ@PKg{j0?N6fbV z5N0!GLr9hCEh(lolrjg*sFlF%Fm0D0_%NpVC#9;+POp8J+3&K5{uy=-zFVt{8E9b6 z7B7hqp_&*R&pkHI1%C$S(@?OeAM-hnSza$4LX_~%R~&29FO6_#+h$smjL$UHnp{# zGA#h52@mHe2y-}mQ#?;#psgYLW+4%nz;;|sre`vc#&9ZXW2nWP4AQM-4T5mw4A zyMfj%+Uy$T>wi5h){xPMeRx310Vx|JWseW_uU7;fPTd2y?+>@{z|0Q^&;cns%Hvvo>Ikx(pZZ$2?S~fPQPNO$^98AwyixwSTIX}mkPd>GEraC;xX!L-xiL- zYwDwT_QT+whmkH_?}k964U;s@7p_Pk3bpk&Hw)IHABF6Gh0^p3-)}ji1c;`Hy)4A1 z(IVv^6o219DH8iq&#P~5Yerd=zEB4Wmjc0F;uE~0rh>W^>Trmu7+Gjy;Q%%hkJ%CW zvg^Pg>hVD=FxuVHM#L~GfffSRq!9LFWgpMY$~e2?>gf``0|+rmd&bbNvi7L(Ry=nF zMV}EqF`TCWPP-#%|NPw@5bvnli~(JDWgM?jB7buqar`6nX2K*}V>BEgabX@JiuE(G z{keDa*E@4fF1eJMn3rgEmt-?GgYNXe5Osc;OfvdI!LAWv^yd#UQ~B1C7+CTg6tFz4 z#nsw&<^kxGg{^S}B1B-JR%l^257Od3OtYMhT@5XdFbN-c{IsmXYhW3jRv4K zaN01+7VtVRMqdZFQLPT zrZjQC^0snlUA^3mB z>2f=?{j+O8mUg3zXZgyyH^iZ9sGUXOMjLxC-H#OsJ{DIK5TxV0UU0!eF$B}%+kXYv zSzeEY9^oLQjbuAEr`CLoV&f1 zX!m8JEocn(0EnLfK#X=U5z;lrntq|HHR&##-^3eKkcN~|oUF+Y+K!12=RtU+KpY8uYVZv2X!ZjlXTS#QLa1WzC)DT*YR>rCIX9d!BWzq z8WEtV?QQnQL<%$}hRUhqY9_(v2cbJr^RjlC;R%5{g(?W|37$62EEb}iY?b*ycO6w& zW91=?A|Ha>?YoYZpTsoDLZxx=1rHi_VhNPFVRs!_SBpiGW_jFzBrnLWpb zAa)%y^kV2oqV zJFHwAC&nHzgU_yxWHNyN*wDu6jk~;gasS~VJDBn?mf3I?Mq@a2UFI}W7Px|Afd{Z9 zvKD)pu|9{$+)FpY?(*k>2R?NkkM`nYDT|QVH>U8b+NW*(xH~F8%_hFjEbIL^N zyiAq>HVau&NfuF#ihp7-bpXd@dwsdpT#Z*hb{@t&#)9;2jo3Cbuf`lt^$b<;msiCI zRjK)j9WnJ4G$IwDWnz9UWRWI7MIkB9OvK7L!TMES&OC`##VSN|F{LCe!qp}&CrgLV zrs4s_oX%s%;bXCwgc+NLpnj4QNWvIQzfi!QTqkt0QSKB@$A1=lY3Mo;Yxp4TM9cu< zXnI6CUV!0YFmmbJ3n0LZOW`L*hY!K@r1}ajFIQ>%%vUzTV4TnOBRNer6{2UUhB&cA zLqe^sq!x@#rIyrJFqRRRLq|zPx(1VY3?&)Gi%;U)e-*wsTP~1YGSVbXj}k-eqq+D$ z@^Of(zZNlw(SMqVG|kM@Udw8JpG5bfOuS#s2n!kkpVFwO3JV_A9)p_C4HKEwxZBRf z*}BF|0_@)~i{Zs!e;8ocyXXy8F|fw^SM-%b>fAq7NY|fx=EQvmBl#f<>>&&6Aq(um z>vYIvwhrUN;j!`2u}@gq{D9pbEFH9t-4>FEgYdxZ`+vjjJ23NoJAmMrUbVs;@U%B< z|8?6C4=X#U6uY@EzuuYe;lBIR=Ro~4u4;Gbby(S9Wi5*H4ra#O&C~4Q?mA#&_qh7& zo%z=t6S2Fe+hJv2-^#w;ef0It{9wB|?7PFt4l6sX?69)K$_^{rg_RvF0z0gie)ZgW zSlJG(?0;}eI`F`O2M(Cp%iWUw@LtFu4V|S6vC^xf_z2ecC>Kri)Yd_;pOWlay{#U< zTjCF+{O(s#e^WmM8o`%J;0}mMsLO-FHx1jhfH5DOW!r}tma0(&-Kt%a2@A0T%UtIj zPEEz88JFx%2$S%jK37|C(*Jc0u+IEK+iCNem4C_R`*ay*o%!){zs;xkUPR#?KEW5h zZx;~l)1$}IV>ZqyH{!VH$tkt9RHcO|UsMebff|EHUQAhtbtl4$o@OFErQBd_k|uLC zA$sJG|L9|>$26hjMl#HDcYTOTdJo@xsyRT`oVBQQo^T9!1q|jHW)#Ey`ZkQ%g zzJE*7u}Hmp7eV?8rhRJaNjzdKpni9%AJ&D+qbyuRqLReiQ5ahdbfN2Au9k5ueX0S( zwqRn0BnYX@)I*rfRH@G9HQWeH(ct~8yZL<*w@+7A`^kCMbo$x3%BM{ z#%&>U*<<>l99uc^LC_ z*|OFW3f;vN(z_GvQ=B~1PC_&G zRXk1Fsj8vet8^!mbuAsqphxPwYJas*s-3s8(((XU=I>5a2L_SkTM(#}L6nc%7hV9a zN#TGx%CdaxxL_V(GOI}3bNETGK5d~QDA|tWNOoX%v-;I_$oV7~9wE)2x)IY5bVC2R z>jOYMsutX$iNcNHW+8hzS(!pM{8>5bdc+^qx{$o}gj1=&3L)#)6;!S^^m`#>P^90mNnN#vQOsS6w5&wjIynvMom1j?-mJRW)G#Bh%z<((nM2XZXXIqZa zwnNl4=Q6qM35hdN_##>6l?FfZsEKRb&6TerOUww2GUuraq83`Sa5`fw3O|9yGE0&% z5*frtKBogc)e2R^y7dv-FhegyZIUue77I1YNf?K6rv4q60cg_d(zMiAE6YJ-NxiHn zd3egAZb69#^{ol-et(eKvS=HY)|T0>u)WeG2MXXe%cU+!T~>Tk+H$DUW>(H`XN~%h zX;`8c!o5OsxQuNY=t-X8d<&)ACb~3BDQruNMHC`J5_=ZWH4=9ynxa6Rj(A#pl}@RK zHI@XEPcD~b*IFl4RqR#oFpZxXYW3cM^74pYFg+j4w;rg{OMi7$* ze&ug_fVxb(kc^F=DBa1Lr_un}aXOsxs+MkYaPmy`=EL8R9VR$PJoPconuId>Wobyd z6=(x(R686n?e8UzVM3^kmY(0c09gUa8bCouN8ot@JV{~uJtXNTveA{^`1A1?WR0YB z!&vtnj#*Q}y?;^{-m2@E(pMYa0x3BOSau-_L4P_@8i?X`+Ym+u?tX^7pEH^b zo%LC@*M|gjGnJA0qGUIo~nWOw3r+dw6e*)K?viY6m!5 za@cDy?|<@V$~&X<^MTR745R-vx&THW^xvGmdiApZvVV#%AZyiF5bQ+>>|g)*Kf3|y z@tE-e_ZZ?aL;umg{_%fXmY-14@iFcZL^AM6GB1>0%|MznfRCZ$F3Om?9P*lNi>(zVlo6MqK9r(pvQp7)?Topu7vc{KYJ&HOL{ zU5=${ww9F%)n)!lcJK+9P5R9j*d<+e!JQL3{ zCj=e^*u4tHo&j55-1a}DIp#*5<=O9L-2|BMd6DCtSCo&5mVYIYzT&&Kyj4l#&&PbB zb$=1%llUzM7A5x@4p1&nOh4T7G)zE?%a#kFOw=;`ebwH0;JDAkal_%wV0dxi;-(Kd zI}T5iocV9j3FuPUz|cI7VC4f;VR=9-D{Jyi(BTaRZcP&9)C9@oxQub zstL}sM~p)t=R3-)cS0s1sBEGL`_d83*m_0LtKkI25*z*VzljC@`QPjr4gI`~s+3qQ zcB_)BRs_Y6JrP|6XiIdB zqZ13I!o}!{y*vS&s|!y#CVyF}3?fF8pt5qTPHR=GEq6cBC1+sj2L|lQfH#-@i}QL+ zCWz|=8E95l+Gi?Mn3%!}d|)>ks8B4a=9-jR{+CRqSVXEAeuci~)W73+QsT8AIF$Gb zz~ca8D5Wt4V3AE}Z%d^yu^p|?@IQ>1O4JUySJ7FhFro@TdT;gkUw@g_;Vk_kXX)83 zT%K=7{gdO<{>huy{gWCq0sy-mF#urQ02GyF)uc~RAW5G@pXM4AZ7Ua>;_S4_<+Iyg zZU)bf*dQ>0J-|n`Z}!Y}soQWAbRjFAgQdB<)MT_W9H~8#FOt|qEub!JRKcpJ6jg{U z!`KHCOQ`Q?q+qBEo__^-Kqo!bDbzzBEU#aZ|9|dZ+>UN)>LmU6|NXz7pV3e_s+a>j zT4uOvUefm1tDg$p1H4f5P!uwxH1rKF+Nu8U!q zK(T1AObAqxW)v%~ZZTt3xj0rP$3)xO$4Z49QzZI57H>uax*Eaew>^lzFCzYaytuvj zd34(!j%s&oWMSQ`n7414w{)$Bj#{u4;>(z1fK#mbMmx=y$Xy~;)psSI2)NzCE`V#e z3`rtZ9)IXrt9k9vrjxaL@N;_9Nbft0hhCVcN)+UYfvd>O*(^-QePrn+S@)wQ3ud(- z`vc2;CYHOnyy{<$hW+!w$CLi>;%4}=c7?dSVjAM; zbsvk8mb*&chcn496P>B8&*9QZl%C)7=i%Y@IaQ5vIs%#F^qGHq$qioO9P~WUi1(tgG3%Q zwlBs_gW;fmb20kQ{>81Es{laZ=i;`cs(+Q@3$&38k3@Q!RdroxS)^L<6u(?E;jC68V~<~DIa_rUy_;XaRSa*@70ij z;)Q@Z&L{}gMhjGg6UOh^$fueISDk}O$$lLm-X|(5X+R3E&hJb6Sf^eI|~k zN93CoDcw9u9MmiEV~HE%B<^FxbbnYivq|$}0&`R;lZd|Rs#`!w>nBM{;b3%|D31bb zlLzm{A1OaUeXnyj{8*QRJ+|Pm@V-**oQfY2J(M~GU!ADHjmbmFZ-90Sxb-fqeNN3b z)p9Q5lZnmob9jpNC3&F|Oka14RzmIVGL*fa%8R6jc&@|afLr3)gN&*?S&28UG1&-JBROL~hEq)HGE8zf zt(0DVhEM5Im`hN8|7VT*$bTMHYcDoU&5HmMJA^F8$8*dfkSX3f@Jm;IIs0*NQ+sxy zel>=6LHcwsBSja^n8>Kwja;A)nF=!uKmI(rIA_m>QGREc(aM+=|2v4Bb9%M#g22ZZ zLS7E(#2>ybcR=WW{y#i4D?O0Eo%~ln4Q_@t^3$&%3I6%tNJGJ{7Jpd?8sR_xTd*-G zfjZEE0&d}Zq#q9lqq7lc$^RGX)+KQR5=8fQ2pdUEfjzC-jK)G@B^v}zDv2@=h`1-}0g@H|kpwo$9FvYETvU`wI9pzMoz1}vmS4%6q5%)*zR4X@RuGV*?o6B?a zf)ua7c*$mORT==eR|EG)OUyF@HzMGkA*ilXdb8hy0}Pdz9)D(*i?oqa*{^!|Y+AqU zFPX6@s(YLWmAQ*@7@(C@CvU6yWJA6MA9jQ${R;*7xM6B$_fh8wMo^-2Tt3B z)Be)HOK{ZH+gD-@E3Eey9Yt8Ue(g)tagP$XO(O9a;*n+@!TJO(ZcDwA4XFQs!&s4~ z-s~C6whg_Z5PvL(-D<_!1oF*#WF&h=iJNrDYtLqTp%fQ@NAs3-k!RH5xjM1Q_tPs! zeD!o5$EsaRWWf=6n~DsgumwN=bG@Bp((hKi!R`#MtjfBzUKKI<-Ki0i&qi62<4vrG z53YE0)Wdoaub)>FR@f)nrDPQ=*(uOsKYVW4kJ3&k8Gn3H^cm_tBi+Yd4d??0Rql(Z za##JEflIDkp&{S{J-@Wc9Z=+`fCKxU1G_(Wxc{m#^2XJ|DVwGArgW%YF^$F2`l~ZD zFA80)S_xMCI}`<|2b6(`aRLX9`Z63fydC^ z9An;NOi`~t`1tYc!_8HVKd6vaR>At*YoGsTw3K&6yk!?+wGp(n*T*{42GuM3_`ld0?!u3Tj!=d&AfYBBh~+X;u74x*DnzOR|P%$N0YZc{!2>pL(Yu z@)mI_U%=6qJ)p}+Ji-^y7$WtfPc&!Xe8`EXvWL+0gOJ|0&G{#2Iq>6``7GSiG-ZFyyR#u?n>abfIGAl+byyT#7hhuNZbU$O=@g}l~6(i5ma(Py1NxbK;m1__xZ%N8bMLvobI$L~otbBM=AM>g z`R`j=+UATu*C$W5!y@pxrJR?(6$k29Tq_L>8M+;czXtiqqAF!ETAIIc-%+i#;wpSp z+$IkgSAIMx-e(s5%J6{6|LTP47ah(~RUN}ws%G-5(~zm0Vu|>K=%C)BUbkU8ESf+h zwU9?bm$!|s68~CL5)N)Ar9quuY}`;-VVS3nNPRAWrOc`RGSQEXchBrMT5r78>`04g zSMQJ)BE&d^<1uJx^WhL%GsUTb7}b-lZ9RJsVqXc0MRkQaJNUHoC<6Vm}yf374YV_}rYWRFrp-Nzcn zJuPT!*?Pmf0Ler{*htzDqCTV}2zpbaq*i*?Uk(Ks?-RbE|gl0uYPN+sULo*>cOv)6f1f8yIn|@{;GU($iUj4`LU37A zI9DU`Rh!qX24{s_u7aA#CuLRQUmJb!ixjvtRkXVO4Ann!d*rA<+4q5QI60ykth;f` z2MA=0Yf)a9{?^H^we)oTAP`n^-{;o;tD7>>ogZ%!IV=aCW)jyrR^eoGROT7s-wfX7 zzM&SIFQI>n<=yQ_Y#zQ1^w%c+BX780e*NaIgtS>*^AL@wu}xcVW#yj-pr%dQ*1EDrWT0R+`^+4~QJOAeJ)vK4S2FhY}b>p4+&OyG5`KBavR*VjMqj zv#0#7XjQ^6(MO{$sB7Ts1lY6k#h_x!7Y}xHi3-K~+tx@7`#Q~+X4j2?+A;cig;>dH z%HXCivnF-UE#JuBwF<$p9i|L31RMfBrCChmHx#Qs;NRm^EAx*xr<3#W5oE05y&ssD zZY!87`h`Rl3W4cuNLq=hxnt}jgH*4j%+q?S+nVD&Us@Ap&jIZ}Bk z9S(3IQ7nmpSDvUqGNqDPbw9Dc*hC%RM=6k%=J1Gd?Q%=kd~VwhW9-|XV0XjMHeMo$ zMyMx7;Yq1u#y!%gUb~jW9$6`%nWXvd7A%+jtPDKkWjI z&EF|DRm{40!4+RL!&Gwvg=1x*rN=J}{lI4m5ZX zhyO~*Ymk4H7k=nn{3&=Z0VHmCXcbj1Ua-ZMFJf+@&0WrwTq>=fpyo0?$<-eKsd6K5 zld!gny}B!oEQ?-aRN|=@CZ;4$hWW&YA8a^kKR%eBIjb*GHa`6T@APW%PBN$729Mya zgwu@Mp}MSY@Ie{DUm60miyc3V$h60s3d_zvuXD>m!Bd0u*+C||pYO`BqnGHR?}7H; zT=Yf3EFp-P9TthvqoKD>6?L9|C3Dw>&0S^_TNY;(WRBTjMqO6&4QI(_YGvux8|${g zvwgkTCfB)n4fcu8JSgU_@6pHTEI)P?!zITwVk6ZPA9nRLkIE`9SRNWTZfgI8?JD>RVDXrKUG_s^N7sbc^|Ny zS75Y>T4_dD)&W+;$C&UUe8iKsFg06JK2)aVEA&TbqeRS)*V9oWBO)U;xLQNJmN7nM zrzgj1>NP{ButZMdF15mJXIHCmV)tP1ycM$4Vz|K)S$dN(dTmkAbWWN&6zo{Yf^JcJ}8_g_y?7 z9g28VU2H1>zT2u8&?CH^CHBCoV~;Mq;sKoIm=emhc(-4hlTu%cTzi9!%33+*iyAG7 zZpW99>hafC*z9YtpjXJv54yqGD%)B_c|`7E9A=Ln#BayUE*D}~#E^63eUp4I7N>P* z5#XJ|(2>T7C-EX&y)!(daChc~qR+>qCanhZ++?Lg2veEtcAyz)qH4`?|ruF$TY(-K&ILgj|72~V68MPD@ueOZhKf3#t8mQbpszp|= zYma|~XgIQ(uT!dgR4FZv>?6V$u9Oqw#vEc5BXwU@K_qb4;(Z8loZ~2jO0T>|FJ%j> zi3ztQo(ZXrY)sntbQBS7pVU?;_{ zgS%r0x`_B5({<6GNY4thA{&O6v!>lbcWdToszUZhMa>P`*)|?4Q>?BLHj49#PKi-+ zUCD{ilVQysFXL?VMHX%u(iP^~Aov12EWnR98r>(HD^1dUox~y>-|$Zwz+;9cbnRMK zS_FC=m0xI_CjEMG@08Xdoi-6}2oG{B;jiK z3HK|e3>8<^-yoOq6h;2v^;1Y0Ul4BB*6QEA^Ew5=FsfnfieL~K>Rl{ez)9YTmzqS6@ceCLb$@di2sm*PtN#_9oQ>Sy$x`!1Re)5G~YJ?)Z%He2wEwP9^~>0}$x? z6z1j9j&)Qcz!dJqin-sX0akebgE1j0oEfeWDWzuIPAag{Eq#x)&|0m*F*C#WvVqD@ zcCQk{>aucLNrdpd49OC9zj7UVaFV_dsKLoF9M;5NUt-5%E7P;R&LL;f;;zEJ8^q9c z+tE_v)lApBjlqRFkMyvY>3ls5avbYqCBaa^;p~R(F#=8Lnp&-0GSW$S)KNDE;t?^K zySkr`Y+f3#;#62$KAmTS9;WOah@;Rfql?ZrvcaD(OO7Ffo79EL&coxd6@pSysOB|r zE#`iZid|5xntEQtI7*)@L0_{o43oyBm0I5 zrX}Rl-hn!&9XQ2D?z^;by(|m4CwoSw8SI(wGp0V|u-52KHcLsSZv?;(CSHoRTZ?y> zD&w<@nszE0U(aOjerWCIW%wD!ccaTRXO8v;B0ynqX_|+2x{;7)|5R{D5j8{OK|W9N znMBw2j4>w``IBmiS4_v+Dlilhweu-Nm!BeBjjj++dl=iU7dpWP4_SVM)y;QX8flZTxp8VuPN5I-cKTB3z|oJM+#%46|lX*AbmrjtDd7O(C^~|njhdd z?KR&=Cuc}%@+jmKjqcdrem!Q5SBK;nI_US?F}IkY+Y%W^q%zfohUSZ0Yf*mNISmMQ zJbKbMua$aou@*MH3#ugh2)(p2fcw|d$_SP@fFC~TfUW?FyMsPG)VAzUuZC0JPesc= ztlPo}W|Ax7Ot4{YK2ad-Y4aQj%ixuW&p5_gVkYgZXeN|x9Wmg2J11m~QKW!)Q3Ci$ z$;sLBRce($Jxziv*^E3tF_Q@PsV^^&6fio?q=R{l<|itbCuoTG2Eu(oi_>~zdjp39 zD7b%Ihw^Z1B3Pp#^@ru5S?`P=B80saX!`2Qus8QlSce~i5+bB&*w-;PfA*iiUjv{ zyD(P~haQ|ozG9b00>^6Qi}%S+ENNuMhhvN~TU0sQU%XGT5L^>s+o89br zVC7;KK3M=1;07iGgC|W*fH)7@oyD=hh>DsT>Zz`{d~crEE^K#g;= z1||A_lfu);0l_j6_0^|?S=R>k-5Hr|B`a009ta{Nk+9@5n<2}2l_;RLk zQ-rToi?G+WO{+zkuyXM882ZRdnPErAv~V*O7_n!tdCORmJLySFGn2zJw#o@Zi`l)S zow-wPE7MQMAK$JP$PSj(V_12*oZ;X`!fO!4-y)eK$Ze=9d;e@P6^?bDIqoNk7RBhy zaZsFR4g-@4Lkp$`}k{YwD&{}S!;pOV=n>G>sT^^zpG^5-~@ zf2Hh|-=_Fi(WWp~0qzS^Xi4ec0|rFwAI%Ji;Y$+Z+W&_zU@}u6;#UD0s*4)1e}|>M z1~6bcQX(M6*fa?LHGu5GLhN~K>J5a;2HJtnHGt-#b>_UaQsP{fT3F<~qU>L2#-mLC z7^$EMw8IC1*g$`7xJJLg%+~>$YiK@=?JGb*<>+FyO`kv@x<55R&x|iDAd1%k@(a67 z>u9?PJ{JIq0p0|Nvvq*zqK5?SA12E8m;S8{fE@1}dPw&}K4NDBpurSRJ0B!`VQ?h* zVA&j90YLcc-v*`9F8~s+r2&YEjo;Ag=g`wFzl?S_6Cn6EfA>glqI(uve;IwS36NjF zD;6E!1TaA$P5Hk=_dfg;dgJEr&{@=Jl6_b~pcjjOd(!js7b>vzJCu{7;ggF{uws}n z&>t6KUqL{&ey77>3t+%XV8%!cx=Dq|K##bfr1HE~R|xZ$vaBE`0U~nyx91q!=)P@n z%!?7C+WMhwC*{s z&CYLsr-@mIYSC!C=o9TSZvP$N9G3x6we#EGEoQcB?kphC;V9@Y+%KkR-E-U%H0}j+ z6>iF)NWqHhPF#zMjYM9^1&^TOr6xAa8+?M6@LZ;W{~#)a;` zRkzQJZeOMi_3XDBJ4OIN{r7yjsOpTU{ED{C6@Y`V`UVJJ;Qd+6;xZl&`gN4^utffA zwj2LhQ{ggo&z_^lp{YYx!U)_3sIAW6WP$Ten0V30LWA>*;Tm|Uo5w<80i1?Cj?Ae7eH+LT= znA?Au`SWpx^wLmgTwH|9E^zgNv_J35S1zd);^QKO=g^nB^O<6D?oHmqoNLu+9WeSF yBfO-`Lx>BqaD_R!2@0I=|IXN-w~))6Q4`@J1owceBw`>jP#c=kGh%eOp#K3;!&%4x delta 60816 zcmeFZ2{e@L|37ZIha^-)CB_!YRw`th)FW+@7P1a4c81E%O!CN6vZdTbOr@yA&|nm1 zP?3aWHyHa8W8cPXzk7HpJ^#<=bAIQ4&i8yj=luVj&dhzkulMy{Ua$A{zOLD{yxrC| zEFpC2I4>Z^wPwv4t^vLE2|Yn#3F-pt!2`nluv{%TH}5JTK7?E0cR?l3KLi_re+cYg z{}8<3`-fnL|Ca!-F0l7E51{vYei%Mx?MfhEPby3-VZG1>e3RhHq-6##G-)j*}qHr*O1|Pw_ihb zRyFXSLtwio|5|)Qpy2X2z9$IzYb?Ptsr7F>74RO(p}%}3h?g#p;HOICb$;5y<7hj0 zeokQ1AISY20zXJ||FjkP9?ng859di*&lx8`!9V2tF)dO?n};By&D$aVb1q@WNnRab z`4+-+JD4NE4^zsXcSw08#cXlDA!;^-lI+aYj3R6Fzne(8D1 zd-+Tx8IW#Mhac^UZ_@DOW5-*N3TQ1R>Lioz{@~+aV3Xm569UL%7E}+@Ax#px%$l{( zczKQjuWiZDqE~|NM$ycVb)g2|_ZiC(Pr&4!98uU9)nR{W;YhrG!l%&F@h23(t83#= zKil}ycx$}HGtm)azIgKwC#uZ9wYZHx65pX)oIaexGN}uUpON3iPkVDUuJqIXAC}<# z)wM>%u}>fv3@BiL!Nsi)`dW~TnyL8B&qvMWuHO5!ZM){*$%WkeRBSut^PXP4C-y_J z{`BIIQs~=h`CV7~Y*}3qM|PaP)hHKzMCIG9S-J2}$`{i6l}C>6TUb=xmC;iAs9)vF zQDXTc1$E7VpJ;{LErjHEPHew|J*yyEHDK`Q;4`t8f4IdTezs}kkDz#?OJcjvT)8)! zpA;M<{$R%4p%#gmf(PzDZeM#B#P=J20AC(Z5WDq9FTQ_3H4xkq3dp~`S_i3O^3?L24BmjV-y2rx|t6QvZxLVAab$+3_#!t19lx30pyw6YVIDH%G68|Dv z@faV7xCO|{+qG(%$G!@buX(kno}qGY{yW8cW zl=Ukud9T#w#$*$-lCY;+$KKVy3X(U#W%Q3aJQmw&d~E8lGN# zf@aZxynJ%TzQw`%a8%wJii;?*ey8nfbM1ej@;0_`vQdz+nWm;~r??#_HYJ8+s=ZyE zOg={rawh=ta$eYiezM7N;(e#qhc2l~)K9)&&rJL7I<@w`-1C4;DVl{I=o1bVKRr*L zQcIMw(VNcl>$mw`O^|X!h!QSD`BR7zAw;<;M2Qrl{3S%WB}BO`M2Qlj+!3Ng3sGW( zD6vA6I3Y^BDdnyyCBc+(&y;eX3E4H&oz9vqul-|2-}O-Ts`G>0su_?y( zXAvzU0UET z$`xg((Z=iVPIL!Xm1XNup@D>772S{;l3@V)L;#BLgb8T_+R5PQl==Q+*$}I&lfhS( zml8B#B2NkIx(&cFMK|6SWf;)B=4sm}OZpvJq(W>3LhJ=X90Wox2!vb`2yqe!aS;e{ z6A1AT2=NjK@fHZVA`o&-AjD4~BtRe}NFXFcAOtNCa$O+ghCs-l0wFgALjDp6y)6)W zM<6stAT+M3Aw6Wl<+FeAk$dgF8FsXjMOS`SwSPP8{zRV23K!e`&5EWw(^M!Wc{TW> z{A2GL3PLhG-~Q|vdY;w(?TO0}2o+^`LJ%ZQbkiXSK-&o5z_xJ!nf6$N;)*0T5Pu<_ zGC!b4tp+#TfGW7Nff%wd3>k^mb7)x^xE~_5?%u)YM|N~A&jSr^0rG1*4XD-rvBVJm zP*5}iK*%uDG$`&!*1;&sgNgiIEk}Pfg%a_>V6`vH))klyNSTZGIlSc4~{0h#S%YX`@% z;)8S(NDZZmh1OhF_3C28`O@r1m)D#eJ5QZbXGpUl<%T>BOwChmS=G2o5(k3S{zib= z@CJ&pdSNMgK(uD&*}2tgeIkD+#r@p!T2~myS`5%l&T;%w4xJ&kq}wX}YDEj}_a^dp ztZ*j3V3s`1Oxr;jRl=Rv%jS7*@ViMRio4lL`xwX0_tQ@w=#@@B0hTsf-F&j*+ zT4+yLDQ-GcjI8>Ei6=_@MdSIL`Po04rG4;p$$UTf_#Q+i%he1WFxwxgour&IY7{jc zE8KhvgH?*Isux;K}{zz;~cHWoTG(s zIfv#9{Q~Xp*(=+Jh*{?J`!S6A3>P~(!_UCQ3jOuXuaXT<9N-6E#Q?I3-4V&b0oI9d z>B}^3B5vDQ(ANUS<5eqy-?Lie?-d~z39X2p`b2p5)$^s<{8VTF{Mi&jz7iRaL&36G z0Is;X*!!x88GZVFng(K6>As2`WMOrq`Byd{t8t)HL%7(if{r{LUNEo>9d{4-H3~45 z5cV^0vq3i&{7NOQV8Fx^%!~nKlsUPCv?s#hp0o|^(^bM`tEZ4fw^bI+$YGj9%k1AlgU0W3nvS6x65UAT*pyMQ+_kWnr-3kBnohg+fwRL^oyoqN(GSm8 zv*hfsi!VHB=Adj8Agg3o*3s8cz?gNZHe1@FDq1sr?OXQhQZsA6kNwe8HO!!%+K{G# zFtQZ(OYvy-d#9vUeV>t#IIw(J!RDzVT&=S24VRpLequ+yVNQbib9 zL6o{$p}(!FPG~A*V!7qXH#EFq%ql}+WI^qOecUYbiq!1AA05@u^&I-!t7X9C46;6( z#lB)ZqgZo5u)a6?_}2;OXw-Cq_zLavBhVTQ5*tub{#=%wpoSKGZu<5v=3Dv-unAfN zN}iv=*D-*C;u&<%-T@`1OrnH!$osORQCCuaId1MlDXD$--Bn)(#w7sojX~D;u+qjf zNa^|L(V#Py*lExs7SP@L%$O#qMmjL!pE&w#RXEAh31Ckouw8A$b;ZkK?UkI-qa-}z zncc6Jr9}M<;jFSf2zPeJna^_@!T2y>v;4wro(cl-ZW`}5;7t8o*M5I>qEYGE1P|tbpoWg+^(g;?pOejMPyag#d0)hkWT35 zbJO=2_~!nVg7|3?u9&0pAQ%lzhC_OY*PM-Iwy0{=2DJEEie|NZ=#!UUVC2ao5V}x; z{hW#awXpcqa!AUNN z)#pYDDo4Ju@qii3#esT`lI1&l$Xtg0&)s`v?#hlQr(s5)s!rorLf4}iPnm_Q&dVzv zR`yW))cHQp}S8WHYEpGo|v3TznypF2@I=-N>#KquOt2G{-ifRV2_W(s1 z19V_xpF~!rhBXwZ^y-wOnmKaNC=u8$6U3N)QK>QMsN&EPCEhQg_UUIABf1!&>u)R{ zbL2|&)jny&-e5e1(ToMBA;ncMp+f38a?UYQUL-isIu0qlti-8R@cDh`g{B5+@4t3(dDm@7^!+C9;i66^JVBts1OP@<>$! za~=SSQpr{wc}Dz2#CAC^>!;zgU6R)$95$TSZ`1T@fBqhn&4AJ&*Y@&Z8#Q}0QSG_! zuS!1KqBOdlKL2V}8PVb8%`1K*w5;|2;lTU{JY!Lv%8pNf4IZF&{(3DmUqd#}p za$eXU^mz=3g9kDIm}(fgj%Oj?zr`4K(W7c+fkaEJzf|ZJiy{_73 z+g@*OWVH0W_mbZKF>aUK9VOdz;pTO20v)?y)umV7oiIAT(c;g2j)z(|`u%Cpb3kWf z(i7bmxSsRIleAjLJ>>l!M2nA6$HqS<-tU<0F238~__GKuI<~FxSK72DVLxH;`g1@@Q7)H0Zx}mFU8=@;<#>bjPXQ%a8y%0BNisp6IZs_f3QhPuVl^~f5v+X(C`nZ~@=8Vu zd2G|l@%d`?GppXJL}ZskAGrGkpe*gvT3TU5U4p_Yt5}70qEC2qce6t~$#sCjH^%*GY`B?&$MDxWRdtvf-P3_w|OQ$fzTQ_Eckdj5sv@CeY~3f(=1I;3$2^t`Gd3(KrI zD^gho(#2Y=L^|29b`>ahBpG=>sMrD3k%i+zzK}i3s^|F=B=nfW5_&55{ujFr1WOx+ zl@a&^1QaoN$URGY{TiI8I;phG={HKc?bSmc@sAI@4eYX)4&GBot|qkC_3;J6N{(_{ z+&Jg3?>ukw4POU?RxYg@4>#!kDF$2x3vZJ>a5;MB9b%BhKECANSIO)h1g&RM4# zIkPrr<7*x;_BpUwCOM+>xIC$|hSxv6w9Lzqzi9O=K4Cu)^Bhp#Rumx>dU#{EZ~5hJ zhoaR8m6rJ}_bi2V9q0nP)&^$vLyz#L2(&Foa&+i&@1ht+5*SF+2Jn(>e#;)IcMq$~F z6^hDoBH=cFQ*=@AcZynnP{dj4Xh$5PfTP^{{)!QHW>q_XsI{02Tk$XJiJvQ%Mtl6- zIVlS6H`07H5SiZ?n+(%C6;EVK(=7W-lx=D-G>Nx!$d3x;a(F%b)pseORp2M`pzP zFrJL%&F{SWi`AQ7jx8sc?J_*tHtO4+8T;FNPMPqvs{fP3e%=O z5~~Vmi%zQsr)6wc3QML+2rpe-TdRU*U942~&T-T!y}6p5uyCOt{TjZhuYXt#xiIhb{0_I`oD^&;74;fMgLSH|5T!uZzvEnX;t6m_@9-~e#`C%|Fl%} z(^4noZbb?IPo?A)CHd`|UKv*P!AsV4p0SgyV`gF*Ae)*+s}m%)f>IUoiBJoVC7lHq zUjdpzeeVSft>->kwB3lcIL8s~lAK#|h7DCC55>g9$?q2V!Y{ad*5WG)>nsB|6anJm zIU4&-K{S z(9jP0U3ufkIQyckF8WRrJZg=uUH8HXiOGAU z?u4dbq|>NAUA|`v%emg(<6+iFSztjU82AcM7s>RfA=V5Phk1A^+em&&1eq^^?cn1_ z0BjSk(_$j@epcJU>?6XcmGhf(1^q@6ph^y~N3czM?vZ~SL2AHM8Vq{}>=W{xbRIdM zQe_bsE^J=|s^&njSZQDqyP6()+}9o+Xac#5fIUK?$U3Vfj-{^0Bug;90N5iuA8p_~ z;KgSN`BR+ul(rBrMfm~O#b7p<9U&-Ux_R_& z2vXO~{td*s|0&7t_3;F1a%D_6^txw8t4$6y3Cg?y_N{YD)Lwz0p@bXs%Y-l`TXoGk zuZOTQ^%rmeC$a!V4p{4is7`?mSfd9J{GA%t!Sw_{ldk|fV7ed(UdjRXa|?s1Ie;Oz z57^0hssXp<0tVbepmi>ErwKmH1@zWd7kfIw?h(;M6+wF~KRrTRG1XyJ95TUFe`YO&!a2i`+vfRKVr3+1<)&YvY(#VBzga`uS8?b#PdIA)^95*Pl z0|pQp6k$&QZX!Xp3|P+t=6r#2`wGCc0QUSmlhDHlYvcykYr*_DP+&nv9oPtXpbN-d zQH+y;Wp3<2lrU*nHbsIp5fe;zW{(JgVRcaEh8%qLxM?diAb;}0To!;LJy7BhP4ty< z+}}8@zykF?h+Q2*2pfRNnFBWr0f*(8$bvCROK;CxZ@TZjdzHOc#3(C2iG5(JXUJZP zW5BHgN!4URmaTQ@~Q*NgkgHzbnuukOqYjc0NN_TbRjl{Ia1oPl$!|d-VWU@tf&Tp zOh}cF6x-EBF9%b*fjzJuQVBDVAfg1@03kaH=q(FE2@X5{7Vv?oJ7D_&jv66H1-5Zn ziw~Sof$bx>FLF{xg6uu8>}Apk>&pRIi0i)@@?NeAGY^ihkYAJ~T&@H-II0V~{|`Js2#?nr*|YOZ42w;i^>twhE-aLf-?yt)iHXjOIGIaXo^j31ZJ`ux{MmCCz&kImSjcr#^hCv+ zhT2;`z4wE|1|MGd93~q6N&%HBl({bMSp~f zCX>mY$bk36$#k&(1WXI|KYqD;T{$W^m_!wvXqD*72g593yTJnoU@+K!&Hdgra4&i} z|Ck^g^f82KuZ8DmKp)di>W7qp@gTRt>KZ7}2q`5_8qv#VR+rB@GI5d{vOpEAdoQtE z8XJD#{j}?U$@G>VmD@uo2`#1y!gDo38vkulABdCY|01ak^m3D5Np1WsDH8~)1hFf{fQ5?T+rP!_f7|rtACy4rdI+k* zE%b8dUpf6wm@|~qYQnHkMKu50%qobJR{sLD{|*Ox*C3%~B{3$5TpnJYA1-?TlETzdnDC+MMVY?mxz7wtPt4iuOES z#C>YVpD!XP1#>+(c1e~<`x-+B`2cIMESOtfeEzsi=^rn|4mKWaY$j)^QMutc{Q7Dj zH7tQHXjn-PgwoWM*Cv6&6An1$*V3j6qxE(BxL%mt&(?4z(3 zB@patESix_VoYJ#vyc*NMuW0cOIwp-EttMno_S%m`$$S|frr9YLZG zpy-t(b`OeuhR)Jv(=hBlIEIBIv8O;3b377@VK7Nd8j0Dokj$R9WY4#-my9N8?1e82 z^gR^X7YZ{L&gvntO^8#t2^6DLn>ATPVJ>E{zp_6O=<WZGwN22q01rex?& zsVnqt)6^a9`{*=}y9Nnk$^E4Yk&62@t8$N?JaNVC?w*84$1FFklO=-PhTyvQ}p)jGlB z;iXG=JrnNq;gXv@W?x?WL`{zdZ#lx0FrSjNYLc}!p(is=y64a#1Id3G?JPDpk^)^g zTBo}nH>ReWrn{QHxqLVNXo0EbNs^Z}zCPodEFoFzVfz17o}%vU`lxnWkIH8HS189h z#S3v!rsVJWj`r!Ub{zXPtL)dVvY-5aXMc}-`*^Wy(MLZI4V!zJ)+t)U;$43{J2`6l z0sMXeb_#PWtJz+CjFh;KUQlvLM<#erW^T%5UBdY$uTHBC^V!h_9(&)^7erU!T^xBy ztmpaT-Mvo;Hiha*3zMqTr?qnpUKmJH$-||GBeitj)aOQ@^tk4hwns9B{GvtW67!&z z@}>8Oo5x0I+ariqaW(I>CbqXok4~xHfEC8#BzsSsN)qz-$kU6mAIu6oKliEtU)|pH z_6c=Q*7*UllC>kPXr~}m)bruM`003qy0IICJ);>mT3g$M2%b%?YPsJHGF`vaYL0fz zukmv>@6*R0r+{>4m<%RH{ZG9tNo(h5sJXpB?thQJ{!FSNk!IAoI=N^ecu;&u21arZcI;UuPo=0Qfyk-== z_VqeUKxgfti^(pRv^xswp*Z=8@V)hu-h z`l%Yp4X2&E{)*F`Is7c=nEm(B%gyYR5-x`{HOXj?JkQN(xi-B!OJAqgw^ZBmd(R&% zRdt)qFA;M9uU~}0j|>k-a9bj`cz0fbCq2iuylZ{ECklb{t+{y)zjWsO5skSyO>oVl zlEXjDajYFITd}s&d)~Ti*_!o=HRIvoeBPHhsUsO3E!3vCK)Xy_O@^=D0MSe1uOp7W zC0|>fYtr}I2Qy0#bGUXPAHHbSyA;+s%K!0@Hg+h#MdX7$A_ok;2$MUcJi8RuNV+SN z-O2roNgY$)hU0 z9?0bIcF@}mCW%=l%i~fF@g_3!f!%?y*z72p(5>7r8Xp@QoU$K}wYpeNK0P+G`MW#c z(*oXCXPz(veIFvVT<+x~a!!73$DUWx*xIgS@#IVD`N8tCNUKJj+!K4>NP3Z9K{i}e zb#lix#q>T&7Ol3QSzkQ3TQB#E5w*>Qa+qIBH?KZE8qB-|+jI)z>r9J8#0Ly{)y~y0f{h7M=C^Yr7VC=cTlR1$Lh*-h6;PrTN(nPqcXWgx9^& zM4xzG(vh!+yYh8*{`>-X*cDm~k~kl}ukJ@qBM;p@HSRH!_|jJ5i%q(fU7}M;VD+qZ zB#AN7uJS~3Mw2uNtcegUb+U=@IQywUu zZr8RKn~q^%+lqQ(qWxeREqmFwXEHa0K2%G4kIYC}=X@)igw$)>TNT;zp=ZZs ze0wyWDvL|ULk{U%jzx`cdc!>Ecj}X{V4JzDp86%Fh_Sr5 zlud7D4qBwBMC2gX@;~=(U6)MSZHQE+jxrh=X6%!Uqmf&+okjyCwYH9i82cEK-6Ymi zZ|Z5apR-l>kPa!?nm*W&7Y@}*0Nw@fm`1f~TwHUby{_k#-TpUv$1$868O8-k5mTQjW?v={RUnSKi#WAy#!=(j=Wqvvgy=-2z>t<5g=R0u}s zX^451I3V`D@-zMDRd_MY?m2dAQ&8A}p#|iNI$4xRS4g?fd*~OG)NuBtOh1pj%v5Pt zq5VShN5TzG&pgZ*l8oNhD!=a>w9+q?@77-e#BBva?iZLC722Jj;Hc zI<~u&pzhZ7F67NQ3@4l=L*vnf9ZA&P58!hbYvwnPN%BZi-O?*}k;)A$iuaO>&5ttA zd`-sQ=(FnoFy2{*;fXFu3kKgEafxp>J{A>X*Y9fnB8o@twy*g!V_y+kn*w=(OiaCm zbu}lbe}D7zRNcYhuTPh>U2dcqpOz3%do__LdQY78?o-3l&8H+_)?%Yik3@anAad=) zA%otqn1B~1`d`5eci3Jq+Z}p;x5pi(31kF)5CtVXV0(eo(G7K=iwE?!y`={Xe%wDL z=o6Nhad~nyLrV91w*0BXm7Ts~pNBsc#YAfA&S#50z7skOwalA`Unifr}mxN$1b`l{*_b zi2qr~qpGSqfPcJ8@Uyd#qxikL8|A9XSXhMBDMP`v_{SmQVopXhRjyAd(^g!2^!`@l zb{N&i!bI@hG}V9yusY|m_o@Mgg3?Z9Gggzk1XJs7L|RRTh+of(Np9wLld{a>ZPp#P z=Fjo9Ef97YE%cP?#x(nM>UL-K5q-IADTCN>_{C_U zuarZJ4^_82yRXZa%f9mC==I{5-iQFwT?FjT6$#fPcejq79i zayeAO#;%vfNVam{kh09-<wx5Mxj1}IOa%l5W)9ZfIXYa@5RQYl2`j?pGHtr-TOFXZZ-nbLLx1VjT@bFk+ z3T#ZZqn5`{+{+ovLcuV+lcH9H-6)tScfx_&B7B-?x0E`bg!<$A_^I8Ml_RRk31KnX z2?tJD08h2~J*tnSjDqVLSfC!xoUo7v>2{`NB?f9uDf4N(QPGCP;LBb}uU_o^-Mo93PAz z%vgIPG>V_JJk<;8Q7c(g?KUkD?`RT4jpla~?E^02VE*&vHo-oij4#aWr!6(YT|d}n z?u7MsB#dsP^xdFe=!?#k=-48OiZ1EyY7MwL2J^41AYardL}+!%1eZy@nG$b{8jp|G zt{TK&Csf&cV?Bz^=Wpm;?#p_U;250<*7-q8=3pQ!11t@MviW~LY(cn|T}_`fIwP36 zHzGF4dh+#-kk-Z<8Kymb>EimRwQ!yM?ptRTKfQ$2Jt~hpsTTBI%+T+49gksvTUkQJ zWc`_h-Eppjh9KBk=o82LutSE$-EV6ay9Z%rUKJ+V8UcQL42uKH8j`1`Y6Md$cSOAH zCjsY>KWA<@>+~IZB%%Lt3%sv*cz^ApjI*KOqH=I^L%uYv zQyftI;#E2UnJtY=CrGp;H_(%#Dl0R|6boq<8bMp~%2ygK>8U2i;ph~cl1eP5%d{)& zB)Y59Oj`O?w1p*+!O&fr_R0^6FQR9TFq`_YW|#o>yn8-=qD5kYJ(o~SCy+2$Ll(W0 zIg9aH+C`h5&LFtsHlbSV{aCZ6BMyoCE86zF!1%;T=^xo4-T!f5pnrS{!;@%PQ=e9wkbE!iyx7)z(VeLg(r zi(i^~v4m3fd7hCn7gphhOPPBz=tfAHtND(pOZz^0CUe>|O|9oJV{hFQQV-`Xy|W8to@WwlLMfw` z7|JZ48AS;B{gs4w(_a=yY3T zZfrw*bIM(;YeKxNVa2Xe*fTC&;jD^>d?6Ikj>g?^kY(ov)lh{Kpe!A>=7yQG*sP4)B7D_hiMpmT=A(7mP zo*KV2PhCswDtuUhNv^|?Xif_=HHTy282fE0by`Fc(dF=!shCAk(%V#I@q^H}(sd`z z;GQv;uJ#QtF7?N@Ri`BrDk+04Ei-tsd|@cXR=W+XreVI+qGAT!{B-q*4_`%jiqnsn zj!-n5k>kYT!cOxURsY~8$wHUkw$*?VlML-j!XT|($RtGwG<%!xu>l=Qd6$79%#gO+ z=)+moSkyWBOQD2WGh@~DEe)enj9F&Y&?qJ8gtVC5VB`#{x|i{IFgZgv6>HzgVqZWl zNP2laN_j*vkPanC-n1T0B)crtYrShd43aO=>$M76E7~tsBifyE zTAgw_DrSwok<%&py#*f=(hNt_Dn&GgC|c?$LW%3c#qi=SL0$SSrZtmJ;+=_FBj*xW zQvvjzX1I2+-Pt?iJAs|w+&(U5AAEAqLPc@P3jBNnrjJ3Ixk(l^eYrPqEq>rpT%l=A zic{?P?MBN?T_N~_rEij<)!C+|S10?hvuBSE(Nfjj3&xc`%570iaF%TovM~^;x>kSh znzlCHE%2*Uqw&$AdV7kje?=e(mp=1Nq`artR^O5?XCKkOO96LiT2TRYXj)xi;?T6L z0{qbQ4u$s!$2*62Z>@B>QU7^w^T6KbBDifzU`HT6CMffmvrA>WcI;JLB^vN>i!MLT!8PE>p~v2l=!NCr@F#mO|aZH)Lbb?dyyp zt;m)QDfy0d8i%HLDn!Z#O5N3#4V1j=FB=HIDW`o%JSwm~>@II&DP=5HJ zH_F_9V`U2IPJQNPsfuCWJ6#`!J@0gV91gu>_+j|s9m9_1x*Ytex4k?_~8E4V!8Su{!*R;lOu@g)mfw%!|X^H$gzE31xEP{qw(Xo7wJ9V9DUv_o0qw^U5vo(jJeqm0*nwpV+1@t~KcfQ^AbRYM%(3ieq+U|rCg&YXdn)K?>$G$jw<#J8My zR+2+t#%)t2xZ^>CI#BBt>@)^@xtjDOPh)p>vqEh4=>+`D%B;kp6VhkeAyg>LbMZnyNvoDj}MsavXDj6N)@~<)}rN)2=Dzx#_wEU&fK~AKGh@dZkF&RH-63R?!DRF7xp#<96a48P*vCi z8MvqZJH%i!HpXNnmmQ@y+YyefA_ zXvlJfn0u)w>IZOhFMDxyO;6_uk8e_LG#KA|<~$MZH^E!rZ^Jr^ZP!ve=4t-a_?x(Z z+P8uuuJQTChojo}Uy3q{!MNo5#btec+Ae<1x-sU)ezmQ6#=I8yKq>fur*$JMLRraL z!888rQ*qVjR<7om6&`snr~&Cxb)J=br~zJjsjih*$x|ovQpqvS?Ni_UioeEy1$_~q zViZhGpg;E& zph8cY%&xWNCPofof5zS@RbB&!>AZaK<1)hhl;PU7X^%t1#10$Ll$Gz?m^MGP88(o{ zwb|^m33u_Md$Bjlm6hSJ1D>bieLCATuQxr0Uh zQ9O%^>J(tsw1X%xnOum*h)!zzuobzydwEVC=>8z|h^y?DiVkV3f8lN}WT-j51nL??B8 z;7VLqdJmpF(ElO&5m(hMmHpfaqW)KSl$F#6fU_q%J`3bLDohmh-tQx=p~Q8y_rl2o zgCA-han;<)+|QjX>VK6-M@fAMxOOrj_xROq2&qq0)kSVYFK2E&K?44IN(9-ew6+|Q zg>6g7Jt5BbvCd`MoD0lN;M>Kw4)F!TKcW7_SAM(>+T~&F@~dnx%^T*O;BZP$bWzsZ z%lTuS>s39KR;#xun-C{z!1()or}(z8jQ}|G1LFI9&EU*kSjRS&X#YMoB;GKcgo(Jr zUKdzHI#hxAt9TG87oPCMd;#3>kgpTWxers&>x(FEwyhG>7|0*Awh!2i+h;jbULBbA zHdVs@t9$3BlF7UFA!3tH?cKA#M}TwISM4;4b6S#Af_t8qK!3&oR!87T<`d#h*mYI` zak<7fcdESAJ^M~HSYdzF)1z2tJ}L8J-#~7QEnHF~u4Hg+TfnU`-#LPJiU%5#f=~9CW;A#Du0`p6G~q_+=MUDN2^if0#;5SP5H=>koVmf+B$yNe zd6nW+>@$<3r`?y8+|p6B1=UqNI9?M#AKbTqs*u#dy$#>fRUTMl@Muc0)_uJ94#CIX zAMRWnzXuL0zP|@_OonadSlW!~x;T`TNpZrDR@Kj$pV^0Chg=EOgno-3s!P(>dq*_f z&-U&6J^|u2VznaQ?0M9oc8ItQZII$=%MRQfoVTBj_Ss+b&P}VmW0AqE9v?DEuIaY5 zP5q)_md!4v4Nkq+sHr8UN*l0R3<76S7`86-^?|5r+DC@lJZ-!v(gw4zNrW)&hn_K} zlrg^SRv$NFhKF}lgx~85*Vi>nwX>6zndp~$=d>x>`wmT|^bpn&#}OZ9r|5-X2}|Y4>P39r-qwd* zUfaofX+^xPU4iJCk5PkB68`+To%&V1($4Hpwkjov4A#-BRJOf_Wx5lUI)HI@LlgCv z{2EHDQxXQN)cp||WF($42$CqQyP*s$=hgAk(}iNwQe0d^<^T9R*9!WOcljUq0u5XG z`RDsEd(;CwJsx$oUAZ`vGB~Qzy3jotXd_peTYgT8(#z9)-LLFf zlFq!j3lQg?)wC*IroBWwI4~IN`T(WKq_b&A3X`VIo}!8%SR-^2V+J*WUYJ8+W~fNk zB$LD%(O}cD7_vW|J;fkX7>fA>=`=1IP|f55emHoRn;N|$y{uK6PbfZOyF0449jh1t|b;3x=@2Fo(!YEN#GzhvO3VQ8=r3-78#HMCodonRJrX?ztJ^;Uo z2&H2Y_RJX+x^@v0%4V`@G>RB|X(pUCuz+C>YEW2%q;?W|={{p_PcI3_t}&yq=N74O zOb~Ov4ufG0Q52IQon!=KHiNxburxSi7R#Pvnju2jof>uBU|llSunmq`WU~Z=Vrg?1J3@7t7|h~)EC%}i1Zz6Xkg1HJD# zi_V)c9EL*lTcQxgEo=rY!;5{Kjm4k^Sd$Y7bkJEAm4dE77|<}x`B(}ADykqRtF8~r zn#;h@FC|k9yeP#q7J?E3M=#7y&WOxKPOuq$8tjFZ*m+tQiCN>1S*oV6=91Y<14#A^ zijA$Qo=C-FLZ89$w7K2T`z{_6ton-uBts|q{DVpyyZ)j*I`j*sntXAbKq?}$rbQPC z;9RwtPn}6XP4N! zKw^p74g^IX*;(Atwe8wf3FaU0Kr!YCY=9W^EEc-5Mb5U5KgEuHpQ*3b2xXlByV9VK zIcF<~OS8A;=i3Sb>G#@)Gv-FNzfz>ljSY;F@yd@ZQw=au&l6Zd^Eqz~qI%m#JVZn7 z#}Mo|f0Ty4%^70)1=9iN+o_g~qdh2REIN`lFvDbx3^ZW44r8~Wl(2~T5zD~0EV0O`~l(N#zM z=K843dB`&b=^>^clRnp(jk2PJ$vWA6$4+KupzSeZ)kCq&$<%L4ufWNtu&tJU^y<)r zZ%mtG3#iTxM*4@rIP0+YvBtH?oV;L#qSyogSq8P^NzLLh4IZ5;uFEI%X zb?C0wuwBYoyDip+pOqsVVoFQ8z3;w=us#~cn2hDcoQK6o;MX#G zx&wA+mckJm7ncIT_0M6-`X!l14E^SpK9r`hyUnl`VSPTMrP$^$+z#ZK-1Of?AS`E;Ywum~fCC```HWH+A$b0JVHki^Z4oh=jO z+Lpz)tXX#{jMTu4-R!=>#qqi0{!`#-bV*SyBZXx@ghG@yS*AMfe|`NvN}LINK$_DS zV=Q~>gf{B!sBu=%kVg5=#mr1XFM{kl4LWAPw)_DUZq=S(B>OXb6Ggg8SV0nOb+*_7 zhA<9~{ewMPwIh5WhsT0glKp}`RLCw8ndOXVxOK8SBbV5W6S%H#-J6;?mc%hd8Y1!j z6UX~IE9^)gm~<~mQWY(P@Rn2(MH%eyY{qhJ9-S1(k;ZDC7gli?APW{Tf!2x%KSM+j zi4MtS=AJ@2@FW>Z>d2fD*Wn}QdEFhQUPlV$Y|tumYUL3$dawo=F{0Lm<|#(q^|y&E z3F4oPC|Vrd>rbB3Sj@oS7X|lCI8QM9;)mgTlvE=(z_Q#v7l%%;Z$4c)pXiPG zE0d>~FE4YpS(JX(GkZmD!qzU8rUwzE&p~lBF)kK-CGWFuTb>0|(_!KVCW!j@u9At@ z{`RLPEHUL%g8rF^fln{z&~yA!EjF3bw^+Fa6wM93lE@!t zAIelo1ra#tZ6$xCz2iiebE}@n>xHQkb7e&>dg{3gnG1-~|3lk*KsC{Q{lc^a=_(3H z6;QEI73q=(Q4x_Q(z_rt*pt+IlsNnZf8%{oSZ#Z^g!=$SRH%Xi`N>fj|CJ9S|;*@46DC;koh>D9vKl! z{`B;}*V4fy7mC35c;pe0U^fhE zaU9Q0)El!a$jJZ;iiuoWi$7j?ArSCC(Qhr)sI7;vgNi+cykg^?+` z2*ZA4z7aqglO^`A$+pKr5fJDJpnyY29}AJGFOqn+Z>Jb(fk5U!*lvSb5`alSdcuQm z7Dln1UfECJTSrG8MFvqHjEo`RPYys{TLF&zN5B%=!9j)r7%T+nA|DLvBf5$pXOuzp ze8W&gG#1T;t;h>qs&}s?E9rHeJ+pi^69<^&@NU##Ja{+ng z@42tgj=)d06G)Y~d_svYd8@E;kO@DTc@zkwqd-_i9|uDCpEj0NbOP9Z9P0$JKe4Wr zAcjRJ;E7&oYq(w{8H|C&9UKPjhd)TK+|&FEK0v*(piI3n%Hl$-wjDT%&T<^Z;TbaB z(!cx%Q2Ec97YH}fh3Y`gMrz?v`;w0291L}MUUo4_Jc%Oza}n`)g8Kdh`&1rcd~uJdYjnI_+9x0| z6irn!Pjz@2fY?=IJAr->WS@Y^oqE=c1 zC0hd}+bJS|575uT_myo8!Iq7F^C^~Oi%%T z)MZ}b7eQF0;syq1wu!6NWY9#TJ41-Nque%WHmFV(!{Id*{f|PKd@RhrIGh7D1CuRP z)%=khR;zPhwlx;11qq5ZCOanxK!pJI>ye zO@GfVc7QMs@g~$zz{^)_8YY!x_j|ys7Rd&h)R-gl$ev(0|7~cIBSXvMcz^I2yg*?f z21j?75Vk3ltuK*qmN z4mjx-$1~WN8MKGj)GbGtI0bx=y5Kl@9_OeEfU)-YzN@l^patDYQ8ixxnh`#KY(^%K zO!_Yk6o%5^=tl8x%%qq8cg*De!7PB!6Yc8|;Dj9AX^8vjS#V4EPj0$}#*kko_wV|e z^wROIRRx%vgD@uJYrMt?vr-6`urX#Al9#vUQJGx)Xo&eo$kXH5f?D(%A9=Q@kiYyo z(v##Uoi`2tF;j>LFM^ztB#GUr#>V5#k;XyQ6UfZ8Ge3gXEdO@;zG zeydPCX52zu$iD>fwg|$1o@>lX+PfHocNk)__@}wBgfiOddn0O1g6c8^;AZ(P!HW7qUdj`?2LgPvy?3BmW6r|n2==-C@^bu7h5KgLp zGdv?76YqNW$cPzV0axum14+?B+S>pNJ#s8qcmu+Q$O8ug>kRyN)V%*k)J$BK#HUkp z#nlR?rNQGA|B52YO3HP_bUEZAQ)^xQ0Ylv{+sZ7aR!W3(8AS9XsXpThxAD9t@aXCbiDR85VcJ;^X z)c&xeI}(pBa_BTK!mjjb;imZ4hgBMX{Yy}xLzYRenP|;$4naEip(&5v6gqs;WetuZMso6eJ94#`Ehv_POg#vrDYG_G8;y9l{S$O@vMAEeQm z0Bbi;k8)s9$y1PFaDO`3h+z8-ait&S;LB(GL@OfBf~f5Pceabqf_w9)x*xRrS_sVv$ik7Ys09D`s{TJ=7!}PL z-~LBP?|*@q|7S?+e}sslw(1~B^oYh;h#rh!@wO9*C24Pzd6MA$Tc%0CuP^fJGO6O>&r{>Xe~Il!y&O=rYY= zIBpU3Wd$q>fheGXLJ{IBApE2_)E)6f1-v|Ic652fXM6>u-shUdqH51U!O7@C23gjc zK{*lUMWNiMgqkAB1T5873ITX>7}CkHgHWP}N>HvL;5<-SDt`bG35Cj1!Vvjbu%1LG z;?xbO9Kx9gDo+{sr^g(DQ-vP&Xsm+(0s_qql|B+~4Iy$KDsv51{4A;r~*nTN9q4Z4D_Eq?4Q1!BQa#DND7Ea2q-=JNJeQ0Xu?Ub;*=D0 z0rdh0#uB2I4zv{ZA?ORVL=6l<(10EYl3>QW;U;QP*4i#=)CUw2t?%4AcF|FVdV%ak zrVMTjI6Hkr_X4>6$yf_2bu2#ulz;L_r)E^3HWaMzaBOx)ZRi}$rgT#$O6d|5bW+zI zq~MRAf9pWuN6t4#ozy#m|05#iP)l==i*%HeDCTttXoDIO7R}HGtdm1=e2P|m2+Jji z1nT4s=;j&3h#6E7asDZkgGOIO9Es4j25qj((3XQpwSr1PeEO-jvg7QaQnY5JwN=kv z)*+@Wpc1snY@hyjXo=H4?6a+Ka#8K!;SM?s$J8mYf;i;@m7v0EAT%sNGvX0Z-k`-p z5F|_REA!9SEJDc#yjn*1AAR{FkWaubS#VnrD3Yi|O)`SZ8!F9!wW^XA5%)5(ST8~F zyF#UClGr}UBP<<3Y27j*3mS+{5Abx%{$+VDq8sdo{Li4*=?NTIO@_8=woiV4kAj3O znEgG9!^`r)<56hvpg@RIPN1m&Bcuewreae_FV)r;$b!`gHwKg~iB%_iwF( zz|46hk2KBy2r0o(6^ZM$f4Tn+vJm^n=l{=7uhR#-j|5$%&Cr(icbN52ZG8vBOd48R ztMKnprXnI9`6nj-hhPZ?AHG>oPoEyDt#3yGO_N+wtAL<<3K~#IL|pUFAgT;)e;eWd z9(SE-qIu8X$RZh3#o^y3jID@x=bupw8QO~f)_Z_zEBAPM{r`i$PLG$UN&NescRZEv zGPH&LJyti>*4IB%xumwr?%yOkzC->G&`176g8uxUrj7rLB!l^XlVkvN!(IZ6T<2seKqhLE59>9_i=$XYa^YmaRmLQgb+As4^NJT&A~fib3s50JP==rC2hkFK6ovrY{mk=!9nZ6ox58A zNz;eCGdVsU;897It0Awo>i;4R?gNYPFaokQ1)aB!&Q}DCCxP+9Lnp#K>v+J~b>13M zrPyK$x&_T0Ncwuh8A+`IEA}y$>r$+uM9Z2<~t_NRc=Qni@+?#0FZTH{3|%!x~aZCwYvIyg}q6<2o~u z=mQ)E3nQliZD`^l-&ZldiZb#(I?ly~jH%0HVdf3I<$X9c)r+Lni3JL_p))qZ|MVCU}onmyP#T8V0|CNDk5PMG0IX@k{(-#CFq=TI$|uX>$0 zikSemEAVinAGsSdfv#Q$h$`UuZUz3o?XCaQ$pUuPk75-4w<}oSNWw-pMzIQP2|+V~ zV@#(F26+38heU#>YaVmjLYV5AK-fqYs?|x5QwFdy(d(HwSPs-_hE9 z>)=-<$_WaJQ>H?6|7o-J(LU`zOYx$vPaWOHKX+>ciJu8hsr5Qvy+uX;a8c5#Qajev z+iHROvC$Vwqn_)-6BDAXediG0Q-A#`7wFoCqf2g)C&kU3M=yD^Ha*C@9&<;6?)C4R zi0rnO)&q&e=-SNs`hL;L-H{5TJgE`_|)>iA7Q z)kG~-z10{0?7>K3l}-8=dv49F{cI&Rq4>IYwhg&^7x?RZ2SX>{V!lR|mksV`oXsX% zG8)NV?7gomuWj?7o6kD0mnWG2^aCTd(D3eYl2T>6gW#4j5RVyP`Zb@yP*x3>G?Zuh5$0-1i!idQ~el^!^!T9@dnX?(eHz3R#*0r8P!8mrQ@ zQ{hI<=bdkh>&cJAw0E5v{~}n?c<+OSR}Rg?SDTQx9aX1SPf1W(nbjCk)ZMvb{=y=+ zo&EeS#pf4=uHePyH?hCw{D(|WK6J)4gp5-cvTLpKGga0Hh1yw-ht+Z%056t)rC=N7 zj~x6yk=e8W+(@s)_n-cJakLlVDlk7j>dK`Wb7@Lw$m`3mf!+KtMz2Wfl9(p%??%z9 z>)reA&2e8&=UsTD{zy05=RiHiVj0jX%%+FhlSmFkE@Yy9D)-MkuS+LdqxYo&$>b%yR*kTr;l+MmL7A?aG;KMUt9> zU>#zCm4_uJW=>3+E}r`v6PY2| z`ugA<&1)(%39bjE8Q^g9aJF9)+lkIiw&$oLtj*)`tqGK+rIZ0aFxxxk8lr)O-5q$n zP9V=c9J04FQy-Xk@8BOl$u~jpeC`SCa06T+&xxN1^_WRAv30R>4*P2%eDthaVYLAl z5&wbg*ZINoht5j!Zw-Hu1s2R4aqpq|!mak9=>9W4+fxg`l@t>NUl-Ea%GUDm=C8(q zd6bwkjyz@@s7RijuC|=Xr|Q%Ii0&RdLxI~Ce*RL$GPYGnXb{FrmP1#_ zkzIisuM$!ca`<;~Gl%Fn+rhMQlR&c?baHl1b8fOAQx>_#Ah3#v8B7r3G@IWwT&nkc z>OZt&j{b=;kA&A_)LF(byfQU&y9NS>1k>ff^3ULd>75%DV&n z`ShF>*sBluxn#yi6&0jR0A_!6byr-cX<1-4@g$z3aNP&*>{gO@(L-dECAK1;CpTtg zgllbLxl<{|y`A{8gqzV{%wY4^!}rR%Vy&`Hmp2$_?=0ADM~;;irAiooUzsdYBGE!xTKC zZACZ7?wXagsImLZ3m{GB!o#XOqP;|mDly7_iX~WOS`MRxaj6dHuuLcNmAgF$omUua zy~s*W-E6!z9tV0RB#i&9NXyUR@c>cY(MVfV`7lovi*#kstFqxWD6!#gaz)DxcAs?t zF_XFUuqxN+LD5a1>Fz{Di#+@A_)h9Az7c#XwN{LM6vZ>8Oxb%{c=w{#D=oEk-UBNrK>^bWOyY>RF8j2DQnST_gN6=G@W}BR^=Y8FS(OB>A5dSBCnXv@w*{KDL|lzwE}Q z4#(6aMvO*gdbt6;^4@&TzNmA(qyMLY5U!4Gl&NN)-u|)f{RDnW0~`3+5jdqW=B&Zn zU`RYx%&csAO(4>AuIp|D+w}H&jb{WqXg-ENn&F=`ZF>d<&Io9l&V2^L6uhF@MK^oy znw7UWu=~skz)k0p!dBN0x{_Je2wior)UhQuME0-^tW|_36IMReqWV6>xiufvo&#Cl z^nF#u2&edY#qFUG=71%;vn#e0#=VpKxW{Ne&rg_c!t>aGk0m}o2&ph!YNq0LTSzjY zi-FH~SsCfSRLW9~O9fDh+Z`dEUO_`M z+9!>Z^gk^`bf%S9>f=D(EAQoWfvsJPt}GI7u)&o?s8^u$le5%!iR zw{gIhTp}1hQ{6FkFpR{lnr|1w#?FYy1H{!xyvDdKIX9qtPWoQJAHB5crB&24ha|1M zB=^_4mxz1AFxwz-y*!lV)=sLe;`UgG*hc*^CKyC+IW|}A3{Rq*VQ&&L(lebB7hnY2wS-IP=PSyQ0ZUyWK*XamA0yxC zjB}Nlzu+nNjw~q4^*wM&(|;+8<Yka;p|S8@c*CIacD_nra4k3iWX7943nDq7^OEqnSoWA9(s>AO}NOrMLx zP!Ha5USBgx_l9NfX7;tUjcQKEJ@%Mnv5beeB)|T?A^@1)0)#0>mB)RCoCtYWGC>xSX@wL2_J?01BQ`PqHli$sxFB-S;-&1vXg{P zM#wUJ1<80^1keqvXmebYcQtb78t-Y*Igx|2kuvRM|29Lce2h!Db2su)%ln&hI0yG` z4u55vq!_Uh{@&9c8q~DHc&AT`0ZJkVLBe!{aco2-y~G8s>$Y?&_kTW3y9-2Jyb%}P zAjb8_0gfd{X32YZzv^ny5=+qqv$KZVq9*fMxtTknA6#@Bq^$?CTgDwmO0LfQ39N_< zCLpBg!?_%R8U4Fo@v{l?wz}3I-ABg~x>(81|Cltu|6hO)|c@=z23RDQDoy*~w(U<>v?8dc|6(jt; z&qD6xa15dmlhUu}$_3LboTd)g#|Xh~@|w~Q7&uSodNLxHBi`HOdcHMZd)qVxTCG%h z=~>9b9G=s8PZ+UHJm;bnysXdUGBMh(w_G+^14FoUgum`t^G5u7i(S*RkiGs0J4P^; z^Z@zS`JOE$BmCW9r}J2}cFBmupCK*oyQ$opeij06$?a#R(~}P#bXU1?Lr=Z|>G>y8 zNBG@Kl{5R9!}TPrGs(K+x8eqYEQbO~@ozikE80db-#OFwgY622B&ux4>G?O<q zDA6(UwuQ>ePeL@pcsTQcC#&0N(+cT@Jo4*pw0Q-xZl*SB0LW6Y*H*R>@v9G{_8ZX~B_)xY8j^ba9}_tLQ$D zCRecV)*p4_?dIJKf=AL(E9Ncxsv*f+id zH!wqIeoO5ezw7d~x+w%OY~CNf$ks($@pmlx**t zR`(rc7RR^)-yNYihc;I)dUTU8wzGY5FlwGi+o|+{O&4Hmy=h%8zh-7zU~;P!gs;GD z_78MJE(IAoI(X5`wqo8`rq+#LnbS7fSUZ`%zhZ3X;x&S57ccV(QnA`#XC46@H+EJu zr+#pZt)E$tfCsEs>UL^Mt1pbZBx{VA87rax0_^jOBP zmi0ar`A{NnD)k^NgCwkK3|zMNs>p4RD)CVT1!|lWUf!9h?_c;?Oyldi-e})p$M&@x z_Hy_9gRo~XhW4WiF8q+qmtlo?P}>psy)EB0@NH|tlcaAGVEm^*9a5vl?F+ydJmgD< z^s~HK)d(s*cUwwq4)oPQ!ka2HVrV_vjlra?XSk+P`Ne+VHglz$Sz5`GGQbuhGFJdL z*|-cTgdE#)VFNTh!N}3b>(#YZx50A8HB1LQyyvTCvf*xNSIzpNUV^3h)^7Nbp2Ibu zo?jd!+zD< zWv|>8q|>>I7kTXr+?xkI+fFp>Dm__2T>jiFMP0Fw$`xLxPZs-2TC=O&EAyw<{0iE` zc42K1MA*lHGfscHh;v{dx49rtad8K| zlq_H@9~6H{5M0UtNPRzND@(%r@m)u1klDW^2rb!!X2&1&^5BnXqCgO73>|b?WN$38 z=hcczmpaksb+ZrDy*R{K5^7FFQ;aJpNjsSI2Y!AzU!KFK(xXlc4FrXHOf>9ik9OAq zdZwNy^N+8l|54(;bY#zXYmU0w-rarO@4$Wn)11OB(fZke*xw%>+dWE(xvKt5=TVw! z*cJP_nBRMMQTm>CkK$uatH)eXwTsbEeGr>*=}elcP9sB}_vfo-c8#r%aksCTWxQiI z!d=&`>UuYrHSG@0O`YTXU)6biDkSKvukA6X=E>%3Co&cFv2xH#zFG_9j?gzGs1B2 zHjrsg*JIZoBB*db&4Z75<9xVYpiFI$q!D5I6Jw9vPRK0Z{j?oEX5f6dr-jVnOUaR- z>9>#`Z}!vf{5a7IOSfkbCehHVi1=uz(9wY&(Ry?S9_SH=(a=i>0(b`SE3;q6-VPSE zo_ND(+ET@Et|H2Zy|(JgmMFz@R%vIdxl8$DG;Qi*<#b;X%G_DCq@QCh)jH3NsMn4+ zR3}hWg@#E}`mjpFskSfWPtdHYk5$u6C6xKIc1b@cT&ji79H`e$HV_jiYC{=hC||Nl zyHL>xWonS42`hH zSRVLF-P&Bqn-H{*1X+GBBvle4k z#o(=tWYXXH+3M?5md|cBydZWiI?lZI#HTw}FOc@&$2Z0q$R}6Vut}^L2HK|#_ z%cP{txc%z;3vru6T=|jV>@5>6Zyc-c>}EJv&)zNaVc)nu%#|M-&i;GCCEc;=u~e+Y zI)pgzr%DK++-9xhut zovh>Co2BlR^m9}LCpr}lw)@b-Z#Bj$>DeJ}e1RGvYEz)?M~CMyuJzIP(#{hui#Amr zTfu(Pv+W7eW7X&2lU38Cc5muMCNGyJV;Oi^$c>2xpL)|ooK#1``s{mY*9FsBV_7#u zT?$kZsG^V;D@$UxScIUqs8*|{Jk4Gtv5$2y6l}d3^`Z1MbCDOT?Fg&w7)7MSwdMrH z=EU-24p-}!`4J4_G)SO1k7h+4;-Jk0Q%epEYnv+SM zfjellSt4)?Z4y{U91L2kd`~-y(hMXb>?GZw0EYR|xpbsulLfA<$v>6f2_ibWQ z^M}V5JkU|G6E*?kBzffGBXuSYD$UR@r&F?+$s#`@E;5mqH_UlSTu-hyNRGn*squrw zjYXLHkBGorM_^~lXH zSo!_0HY<-ey82Bk^f~$O`_Jl`p3AwGTX9`a-_QdD7OkuR2BuH@`tLH`s3@sr4x!jOD8^2J#0Vhn>@8+d8$6`Q!t&egNoSaIKttx z*F8ej6udWJRMU%#n*lJo)}6qmSn2ty9~l>f+wXsU_|(B^B&N!d56*T0rxb6rJMcY* z`-2dszkkzk=X!&mf2K-G!^v5-o;TtX+ABF4Og)*Nk1v_o=K@^TZ$t9a({eqFbU)Y* zzpucav-XJl?6?wBrk>P%d$j(0Aggo2J^hslJ!H`J=@8p4(M#oK38su6^L3{=Fjni5 z>RG$Hf=hcp^E2E!Hig%IcA2NFdlz{KZxyioJ~zzjn<~|u+b-^~_^A|Pvv$sAjjDJT z{BRfVidZ|n`~^6@yyErpm($B~RhmmE$ik&lpT^ieCER(j0(FaZc{uL!(Alj`{ij5E zyM#1d^PE)k*ahwnqn{F9Tm4S5bWO1Qb96o({L3l0T$SSz>fFL5%P$pmV;4TfG<=iF z5RmvBPIu~Io|P|DXXR7e74e%o7J*@BfvfQ&zf==;b8fiDCwByxS^IFhiS6!_D>7`! zFY_iSkG!Xj7$d}jt0S71{*(7mQRz?{>fC{BtBZB%m zv(`;F_HKNxdaxKemF9l+jueA=5-%S*;O4B-HWOEq&j%tgp?DCkS!3yQ<}g02=5Tp? zZf-Auj}!-m9f}a9%`Oz9tA7XXjb1x6Chdm8fVVFD&G;wWca)$GhR)^lp>MD2t7Jcw zU~d(HZHc1-t62Fv8&3E=NOFp(10L)*tk|7g{MB_(%JS*eIs&MHzI#tiz$-NskHxFN zB8o0}w-n1fZ<7eGAG_IFd7j8<&fKWrc2hz#;XwAOg8HoGi(*?%C8?)-+94#dScf$W zb|8yFpq|}6gi^mSXE>4NhC^K1{wzKj=iOdqNYQJ-dMfk+2bI?^zTzvL94z&FSDq?2 zhzTb*TE*cOW!~AoynnGJN@Z24K;g~VjSm;Q#M(}i>mM0W9NsL^J6Wb*8zS>Vy%1k3 zNS9K`@?2(-L1J2);{H3nA$g1Xw<cC=91m9|A##E{7Q(=w_>hsK&3QW`@F z8og8eCxRSb0t@2f7lK5<2U>s=0Tk2W$4EI>cu+tzHj# zai@;b_PGGZ2Hs#wqt9B+FrFpz{#&2qTHhA|3#yE650s?p&`LIqr&xyH+E&$Hmq@%< z2b?4YGb=4n80iQ|9$sfvXlHfEDXqWp0ClEew70jnyVv2gZDw<3Gg3ptEXjWm;?F2F zZg_J3^Zm$-^Ajc~%AnDbslz6fnYR%c_Bq=Zyr1rgGn~|J zp$zrD<0zoQUEbo2leezkMlwNxU74G^|8%_K*ue3Xq*$Eh_1;;yQgs3`srudqgKi@Y9?y(5A zyDcTThkstJyuF-MH0BOFJ0HF+5RkQNeP6iqrLau+^V6LMa_q`6>w9-EB^z%}E$7Sv zvHF>C;|&Y@Wa(KY#Rm1q)IkD2sY`o`tl5W*XX!sy;VpZcozLbwhL;W^HO!IkO4WE@ zM>rL}zRA*e)qty2)W|YV(pQX!M)0}PW|ecyd5u#Am|#a)?TAdrcjGP8-}zZ-w?IUq^tbE?tE>#`Te9hbuwa&OVJ-7??Im2@d= zlI~mPcAt4EAi+9(X7OUgB^AaJ>ze@z+?J>>;zgcGkwmf}3-#Xo^|_SB9-Ac!G15;~ zPu%CuE#a4}n>=qTF6@Pyemj@QIKYAZ%bs(zdGcdjUfs2XcWi7E>`xlpvU^Nm>5F|}?UjMM`89)AyiA4;aE#75 zSzBFVsMLjhjxRrVs2Wwj?XIe^k0@|u0UxQJI!J0#%#cbyu|BjnNOs)f#ta0svgZ@O z1e$sEsaZa!JS=gBV`1Av%iX^U!_ReHzB^;0U+y&iT$}EY=22tT{0&kvx*TGv}N}nF+OuP5R`oJUGcdki;^{v zUzyIu<_I<5T`iDg2wpx_*>Gd!bLRqo%V16&lV5 z>aV0H=KV5wn=5F2JYwAT;0#H3B8Tn++q5rL0(o!YPS`@0k~dWj?f0)bi&kGoHo1J> z{KVd7bW7jC-d|~r>R?r@x5dii%Eq#hmeM01^m{&UOUu8Ws;tz$368~e?xpy&gnWx` zthY?A6(d>hJbTwpnLx3PJe+3#i}@>^C$-~Dgi#2wO=C||A+)@S^Hl~_~gogS)ihCOnS_x9%7>5*Q4s?3u(o{bBRS~5D>vkG4e zwK%n0$j@BQW7{vNKFEn$5jYqBh^9&NPJ_1F{M!qMC$W2UU-$(*5$Z=~!V$V*BZ@`Fq1>@AwWrAG(3K zylA-$7d5iD9r^tJ&vTMAMkxx2?y=VTyPTKnk+mZ5j;{@te7Bu9Swi#j9O1-9YAtpj zKJi&Bl4`&?%R5lNhI6z0j0mOSxiG&qE8crXt2EEtehD&^2|lvnZMR%E)rA3M8j@ES zdGWNIlKlZ5?(0pxw{Vt1TWz;KEQ}8cz2&+4Qg=}9Jnh*6AC=wDeO}V zqGFmF9UTV&hq7YfkM$U7PA}b`J8!uGLoVzqe>V^a@Q_;86CYCFF)@oTFVU8%@$+z< zcra}@^QtbJ(W1aW>Z)2t2%iw(&%9c5hZwONp4$fT@N^E>cR4&`c)0|zHl{y^l17r-(Q4diI}DnXSvdmeJwsTAXz=baOAZnU4OjCgWjkU z+Aa4*?l|<_6PM?tx=VSv>&cl>n>fFoC1LTdcJ@uq6D8v8w`4qSlkVUl6*uoma4S9P zySx`76M6r^^IZnV@-ro;2H%i@>L9t2G-uYX=5JqTzw{71t&Q&8Po159NXfyY4WVYs zS94T`oY3qxm>}@|a=P0lr8?uEFZ}B+^?1&_6a6>$_Xrxs*vs0l6ti}P#b!iW1R-u* zo}Bk{_O%=$O0Io}8%@65c0MEb_D)kQy)LW@U2Ro;LEbmO=3KKoYw@Tk7I3_7Mn&zy zotPNl%w{XL(aQGWL!u~fvX#Cv=#xv(RVL&{4)%xR2L@|(p=wjY&+b9?F~MB5x$d}6 zXPhJ1VTFn&YF#|%U4H)qWzC z`tGB`OiX{%1f?F3S;(}8;icHO4X?5NJooOB4NmZxGnivF9&X`e zya(QijNNuYov2zdadUvJ7_>I8RTQ>6_;Hw6lH|%Y&8BZoIpG@c9 zg?zSL;J=4B7tS6@SutB}4J78f#4v&jfpg!H)u>P+)e>5dK`JPkF?^i zFG1IfHF>j0jWi$AC*Jd9>Up>pLLQmr$2TGjt@*`FuU%Bk_qusMP;`tb$7$xLg_-;G z4@;?zuM;PnUNhn+8yM8D70I-bKgV>GDob;Ey>m;SKNPmh#N6yh-P8Q8E6`G*=}(O* zP~nb|?WuTs=fEZ-AdD&;*zAyP<>kOtZS!h1WWKweiZ)Fg6cDYfPdqh#8DZr~=f(Qs zG`hU%)H*Fiy0_1u2hNz@cAw3boX7ZptjC3%+GZ$v{MyR#!=p#C6Bo}X7_DC(@{Rp# zq+)4cUh-E`CQv*=&=#OP-yMwJ@*DeKQ^ zUNlvu$;rKY@CB>3b?^Gg(@8Rt!D=JIYSEl`Vg*cI6ES?`SR!}5sR%8!bU}>R(?;eJPng@YJK;=dJ#h1IW3|6`IJ1Oy76H zlx;hA`!bd`M*$IET2}f@A$BpuJcav>I)2S{-=-ok+5o% z$+h(>G;*j=WMQURdhLg$l2gNH9vjMGy2Mq?L+NiI@>vV+1x4OI)nuN2o7YbGGQ*cz zhf^E$_s;kB$~WX*H|++zf3sW&xr}{OEInE|+cP=GBGjzXd=}5$q(Y&V!cDD~a`;rx zc5IVFanU5IX)`+2wX#|ccFV`@;Sa`4YGzf>>2XTbW}u-2wl&iv-6B(%dD>eGr}0`d zYK`Mw3#*7uTb$MNWF^)WHP(ni<|3aH7w(ML|8jIyXol$BDW|^##JEv0d%q9TR%t)M zM;Yq4hiy$Uy>GsLqOagFEk_T2lTBncf}@Ss`Z_%~N|XjY?vOVgB2^pINB#bd+AWh0 zKkS{>U3UVmolcAiyOaT042v;7NE&ln^%KtlG6gdqnl-$Xl{DadC~#W+;$}r~xewLZ zx*)sxWd5oM)y~)B8Gvkk0JGI$+9IRp&7IKU%lDN1LO*=CtNitg4DZ}n(L;aT8m&&* zw;G~Wp$q)xml+NiC0ey5GQ1zom1I{3Ppsk=|B4@MUDtD!QMGrUi@V^U7LF9=x0dV= zSbh9N{hMxaz+Zf3t8eIuepgar&kRP)T)FzPHL~9ndsi6!e0Ha^uYXD*!(P) zkmH8X5#Jin4@sBJW_SV5b~lKe5E;`yF?_ZEiN2r5?MFiQ)GNy@uf8de>=bfHUeTCJ z5Lkw+@26%}FK7s8-%dg)eNR?ldcaj+7@zHTPsymfOh#RC{(kb^pkFG&O8Udz%U{if z>$TFIc}n$#|5DfS^8lXZiQJNEj_R&&3$U+CK1;LQxTWx(+Lc~5O4$9HIDX`Ws8lmwelwM@Ap)1Q*BL&2F+@ z0Fv(~e7E5Y@DbUOu`p5BJ#*F4I4NZInj3PH#Q;c=%#0x?slkC?^hPyRuidc&&Z!w< zL>u*+od*edpB=OqekiQ;czD@&oQYrSHe~YTTGaJY70KXDuR^lwMgOa_` zTh4CnlMR_Oa?48s)W$z{KkS!o*u2A)`RGOr{*k@SsY)ZBXO*lS59?&1rZ?wxZeuhE ziI!i?%l6K|%AN0IBvHQTwG)}#{K$*1OV!{1Ej#Eodl8jEgRhS5aFaXW72&+G?(ddm z=1BQ;)z(O_>~zNo`H!ec_ZDS2VgxSP>xmETotb)wRNiYS5l~`<%5B#h@;s=axi`Y! z5cFPmqkx%yjs=NvarNDWM7jD7&|e$Gy?y8^dS>azz+N}sklNwtYmTVe$U5tlco=EI z*Ybp;*b4an^OdUcA{VuTxO<}>={ujrR_~JL8FF!Ad2x2Hk?^E9?q>Fd{hi#`NCIlk zs0B`0T*da>7!YWuKHdWs;}N=5@S2ySgCG6u^^RdHW#=j-1M_R`fJ~M4Zl4L)B{#pN ziy1F)4lKBy9Oo632698iQMZ%Lc#X!r&zd^dj=ucCnN09-`1zjuCuMi}`$#AfM4A3AxC zkLY}dF>v}!d6ZYO#SFi4j_Xv{kukQXXI|31;Mr^4p&$RA+E?V9bJ2Ur2QKDcp6dn@ zzWjEyZgLc=yy=}cw;S#-x0}tHgBb3Yy<%wq>yB5=zkycI$oS??^e;WRquzFZN!Qj) zC@CP|lo)`N(@HYQpGTD5a}bJ7@ai@Sl5UyteSj9Nc*Y-sut-REAx_y|V|1>|7XUDs z&ue~43J;ZDfS)?Md9YvFYn16~BOCA6|IMhC);jafrE|CSYK96NC6II}TX(We>LsB< zDJB{G!*~WN%OI@gP$pJWIAtWV0P|E>__kqhCLge!h*t3@mX@5~q0awi(2O@bXAm|r zn-*)N9B;C0pYSo+*)rXTGaofJo7UUA(3t2i=cMwZ*C{s7z%;C}bybcGMhoGx{x$bK9Gi+w5dU&#Lc5S`GEaK@3P@FWam&vCtn~A=?O=%LQ!;u=_m06kpwP4TV zTzIKhhLJxnACI)7i3wOcXE(QI+1k1IKm-uxj@vQaD&lT-W75W0_Z-|YwKsGfi3l3G zv6c~3(OxqC)s`nFQPS>V%!RnO+5D`>UZ{7+!OtxUBOg*0FPBqh`R%gyxKfR?(v%%Q z%~)2Mz*+8h-_xzZrB5BG`EB*$?RR#U11k$z04+&0LI2(q(p~IQs z84mf;%kPQ$I#+5ffp6SWXNdND z7G~1ytART2rhf{x9+o*ay~E!5#0&l#&`&TwoGdAmsrrFJS=~aS3QDEXduk+j5V_dN zzR$Rzreuf)xu&kgB#`syNpF&t8;fgfJqFR^_j87Sa(mM8W%P)V^|P-l6F;<+I!2Hy zj>dBPY;n7$41s>V$&(X~FDDf$2u4+&1A!~HqmTMfl7Ll}9Ps1O*SN)LJ5LUPy7O97 z?bbyr3)$76;|CmpkzE(u|)rtPsJrBsbC89S)(tgNxrLi@GzYUlUM4vQR zp3kknAN#R@>E0NsPCY6$)M5FZdPANLr}TwAs@C-n@*D zv50f+y;C43VypZrPwiR=uE6=Mx((1EmE+(SZ*> zm3cv~4s+c?YQ>AWGLNOk$BkW1Jp0wRYI^l`Pex{g9(Q2O@MM1NDjZ!PRm2Q5rwmr! znw#rHWeXwOaL$H(E{h-M3QKIHpLU>|E?PkJ-}cEr8~1S%0KSai{}NU?XXK z`=MFCyosQQNZ~BohlB@-rKVZ6OH4MJS=uF2A1_@y@crFj}G2Bs*N7hse3%PNcd=G^dOq5ltoKz_eyGJ~x{BZs@lvw|j< z(R#vuRfl}TvjVx*>piB$HsAC#Xn7F0jrCHP);kvqLAt3#TGa{fpYz)W2V-$^ZRLMb zwULAUbwgygWEV@sde~)C@w&N#UGCU6Jk#WHTW`0n>|k%PT^+tQ&mP!xyKe4am#11A z{y*QU>3Op#lZMwbauZkwne8NVIBbcqangVZvaO%XTX)YN7us&3Rc(w)GL4K1&eV zu0RXqFr{#@3Q6QHHA!RDWUiC#H5t`f&BZ@HF+nSYcvCm2Df*hd6KsQ?QgvuQEljzg zjdyInrXpN_%A<*>slY7(SRF(e6+;3~>)?qv%_xvtv8ErjSKH1^Z`gk_YJ($jw4!{G zd1VeS!`7DkmDKupKvzW#qTx=cL->96X2UV(dEoPwVvBe&ab>&VePJ9!g z>YyNV9)wj*1?Y~&Mgf1JX%-Aqmgd7L0I5mhlz<8?VyRg{73c{Dv-MXB?3RiQcc>y>nYvWR9zWq>BKT-gDM@_fS*?r4 z8t1OIB{hlwu@0FFmNr5w^5WO-BfLD9HmCg3lsuoPUdz>j0$YEo>#-ZaYR9iFNL1j) zCwoim-%30$58vFiThQonTZp0MA!|FVQQkeBstZYI;`?EhaFO&_4BZ2kNMgSTO`anFqFUm8*1Cg1w1of@){f%@A}B*{26~r5QGLb{(Yf&FbRN`Pq9B zf&w&SAL0;>Au-`mV1bZ)b12_Ql2bi4oUOkV^#B({3!Kz9nLj#2uGI_N6+5E{}Up9|eVrUrh6wc{-(3G#>g?4!-J z=CSDgc9)s&;@3QwBaJS35ax+pF+#U94?rVY8+zDfRO>GuM3QQIK+hCgPrnMGmX*jkaiQGY zuV%%ZyD;Z2@1|9)2x6>GZLP33!-C+Z3tJ9p_CwZEI5}iB-!?Nf5DjJe! zGi9g8rzgL^3Z3CRL2Z`v>>7;X&exR5F+U9-3lul>QHx(V?>~z#foRk7SM<~%D&Fzo=X~x% zw7a!6j$NPc7kX(!PjYw2sz!fPEl_J@*YvVqIKPSjIt*)3UI)_}hv##&(A54#55eVy$(=5O>9Jqq^lTx>MD z3^1#MZjJpm-R+m`8RY3)L?baWsPXOt1Iqlcttrvm*&fj$Szr4b^joCGj|lR-&pn@KH#CU2llcIu(XU|2|_$6!I*?&FW$!kD-^lKQ>gac z?Xsvhw%z+!ziG5FuR!pXp%1A2+q1e}-Uqm`A99Q~Xu%Q%bR9j{HE!pkPWT;0kX8YJ1urjmjY8DtZ*D&STO*g$nG(lxXa252&0 z+Mf210(Sx(Pz~spKpW%U-_8CY{sU^GGP6h$q=ALbqMf+`8u5SK(8K;vr0xlf$+^%<`o0+G*`K?w%2Y?E=rKf@{Z4oD# z?}K3)h`FFzJR587W|tMtt7w$tmIEX^g-Fr9u9Ru$VSl8I<}hQmeD4j;G0a$4o&CV= zo<_FoZGWiopHYAO6jhSJT|CdjILL&RwUt1tiQ||TxRDww^tKr_zF>6RHVF1bL*zd3 zr;BKeQHQAB^hS^PwCI8oIa(47U|9*6DQM;aZzS+a{q4_&!`uV?M2rG=>P2j(SPDN# zGv=H6*yWR)@Czp`ASuzoY<7}KgCYgV{Gjd8-PG5vqy2wF9FLxY(8`3U5#(!cjbV2O zyN=c$#U#!Gj;VY5e9nh8QlkXQe6X#t-Q3x(WBz77kCQBqYA{{{(i+j;K6V|ycLJ`x z&ImY-8b3s9?E1Rcb>z}R9v@zvjjd7Y_a{V z4k(o&mxe8;leg5qrWd%OhkZgd3@V^o$~h!+9oc{ARxp%lQo^m5ys~9a`-uJk4uoVR zMkYe4o(dYAdEr+iMpK9TLlYJ2TKk|wg~M+2=%cxlT|QuC;H58zhm6WxH^WE$=RQRd zZv=NdO5<7S?m-DTPTNOBc=SBf+!NDxm&?BG=xmxeFhr84E|!w(^0&7{jHiRc?YI5y zS7m?htcmnisWmr<1#jwNm&HR-e4s@nL#ckic7hpJ>u`UL#&Yu5-VpPTXYp+!X7IPA zgI5yGN??2e;{#tUacxt7ySz1)(?d&K)S_P+Je_cBq=a^Lbg;^8oD77w%2;w>rSLpuG#UBbE!n2gj?&yXUm@UWmn0oWs6fu-9fi;F4c6k z+i3sXJ_=j`Z!HddrTz{AY!v~fYD1XAz~vAr$~qXZwF`f>?rWDfQ-zQFXk@iFMU{Wo zJwVM_yPJF28$^5M&$h(WK|F2SJS}}oGJ%WFd*x|u>$h@$j-|!zb^ zsAjsh=w_Ei^Scn1KjXpbJJ<8&E+c=dKMleWR^V_wKB7kEYi-VKSM&KnbhH;8{a7T! z_0nd#KkUb|c@m>r2rip(ZpX$H0L%l?V(j`Z4h*mg11!-C-&V>j`HpO#%Xnus&})#< z-`#@k6McDlxJS!+a#1)LMD5jh2MXtb3PP* z|7M;Dtn4GcDG{MaM704GJcI8M6@qk_1hXJo@5WO9`9<^?Br&B@;^Bag1zgNwR)~C8 z{AUH6NqAQGL37r`)q31zwesRQi<7lN@VsAMCOlu=a^m=Em+_8w^l=^z=0e!zcT^*D zw>Brzs`>nI^tV6yb>b~2Lz{oBTMCsxQVqG4GqinYyUYi-(;!7G4TjvR z+pXJ}tFalsbzk337b(^w?xiWuLz~d5nR(h<3|`m4P7^c{kHEnf&uD*;NdZN^{jC65 z0lC3GU!}9#bTOP_U>_35HuWz7Fc(Dgd>XnqXb~%Tu=qoq@yQyGf1Dp4P`?7|*Acw- zN4qTV2I4vAq1SUjt?N4$YQH~l@(P?hUx$;ej}9nb1?6!(UZ+l!`@>xpBKHE5b_eO| zEb94kmyw0Su=eI?05*S6C|mS_C9)j}TXi{Y+3ag&fwQ@Nv2OSGqxs|acR~8OAH%+# zXC3_8HIWVE*gikz=?7Wxn}|HL)vfE&w)Xo2#nz)(Je!9BmbCZK%(SmfwfY_obX$vV z7emx6g5i4@YxKw?*9B0+usWb-H%yyeJ_;UYQ;aTivyp74Y-WEU0IkbQZMr!y)LINB z>2@F2o#j-QaXo#ZzJpy>$0+o2xNz?a)wu3{sQdh|57ycTMVem9F6$;+0YtJ0bHrrp z(y(=3wFGThe&S0}_KR1b*cN#QF;+CIKM<+r*+yq(i#{Y{-9-2*X^=nsB5c-CG7}%t z;`?R~R9n&8(9M4}&jeKkde3JtUEAFlrzx_9!x5>nF}qt^Cv$dxPVWu$+~m~u=jcGx zT;|cpi*jdUYm7U--gRtZa6=yllC3~8yekdn3y0g0nwYz-nMmG`clmgi z*vxqN*^f_8Yg>#uKi_4XUhqeej)3{+>tLs>|~6&r+uP-H0< z+`iyob8mmUkNhZ0;_&8CB(9V-1*Qm$VWs!=a@(}-sa${3d*faIL19A=yH4*qB5y=j zU&pr~(~>}BJXzEftP%PIH|L&%2wv04vl8tQlgE&*x!KvzxsDt;hHD zuW9Z&P>WY5?E?!)F09w8!s_8+$M{!?&%xjf3 zZ%4J??=)pKT0OU*0x|1elNx&1W#kqWSlqQEtqLuxyQZ6ZaG|R0k~)9j>N0m?7H7h} z+hyCjqM+vMUFOv_v9)(-T2~D2pY&T!JAWOIj1hDheRi(+I_Nc0&-=SO7^l}ub$&IQ z%lCiZjr6RATrqdOzpGu|N_e}EQ#%>$1sqiYKEeM0cmJ`swHG}H!uGbA_V+=WC61iv z24IknfpHvSuYj2HnH}C-9w1L1xI?d}sHG^57Bh!G@FP#S3>C9J6B8a5f$Lu9l{5B=JZtXoM-9f^=Fe$x5mmv5cqWQ8|4B6^QkLX)W>|rBbI;Lr9+4k-kDrc?r0LovNU=P0CPk1hEi?t^-#1s zJJ@9gxOi@}eKpkfwy$Cn0jI-f5iXEViXAM}aG@Qxqx$g}9!#A1dUgq5Pi|6Mn<>)* zP@3>yhJrAM!#Bb61Ud>V6c97F!D<~7ENSePDdY6`^kgG;T1yZ2*gkMF4&HyNn^pb= zcgl8l#_rDkk3I7?PqC96WW;5R<)eD)k|jBm1xMnDJuK#UIfM>)wG}uw&L>m$Kpl*s z0~!V0B*CxwDg{h`#~bzUaD#5W7Y^94vGJAPy#0=E+zuwG^-NMdxTrlk%m_>6mfb+B z7HxL*^5;D*R*=z$eRx310V#iLBV~^d^*^r&Je;}*Zr>kn-+`GQ4xj^4c9h5e+=lYQ z$`1O&ZtlxJ@67+)`%d}9(OuS$XR|!gTH;L6 zwiT_Q9pnjBOepm=PvW6K?ZD|*Y&E$*BE`0~X9x>=>F*N3w^AnR&$M`q`r5aJqwt#e zD4zY$d*nf=O4qv~5NZ85N%FZX5{N=={mu1)wfK%gcK?LZ^ef+QIim!Kx`=&Rh)=CW zroU5s1EomprfObYb6bDY%3|sZb)ax55bPyB!7FMa=(9o{4lorX3v?_Tz-Hn(J3?Q! z4Gf|lAH)KqJuFN_45Jcg0bnf^!VFgS@!T!-vn#HiHsL#f5S_GV1nn|wj|^|cb5~IG z8Q~Mdc?#g9J(Bj%-`xW7j=Iel(DhKp@d_m}_Yub*;cF&zvNeB3-4PP!`XQoNJrmm> zdq@9yXRgSVF49cQO0;^2vniXx=k&l3b^bISXY_}JT_MEij~`?v^R2}Zu;e8uV0mK2 z)tYwZ0ce$lt+odu#Lz%3(ZXyVq{U;9WH}wX3OYT)Bz$ZvdzLZoMOQPvz=`00q8R2D zrm>tAKFP{%ni*rKdNp3pzEdaCM*ZN7VI1kgx}yf?@%a45^OKV;+=p6pfXocK5VQ34tB#D$-B?PW~46N2&OXA*%Ne=&t zlf`yu`$yM+4DALP&+?^puZcrfS38TswKn!%x*sbNd?aqhAV^2KU2wrbF$7cM+XdKK zUXO(8;UIscqsavb)nSTA@grWsFc;8jV!5WHmeivj@Xh&19HYAak3^qDLW=UoCo2N0Ig>_ zar%fdj$AJ3e#MYK$va6DC(D0kh;rQ__Z_0#zKWM~JQi4-3zm`; z)rbH^O>eV5#i>AJVj!J5u4WQ!eh|77)h}z88J-ZRQmBIP9^+}_%wi$R$yS*Ubk|XZ zHCCR2F!UkF-M;Hs`B6;bERY%ppYvhOPAq{kH|(w>>t;TWlPr&FkmLo~b=(wk*oPV) z#IAp1hFsx3q&OOP86Q~OPGoKcM7OQ3e838{#TGQJOu8r0kgeKN>UqI1Q4vojg7WOl z#SkxLY?8$JoGiQw%&BJ7P5k0{9;bOC?&FUUmg#%J@tGT8y!AE_hD2D{6#TD!Y5nm>N; zhHY@ORH`8F@l9MJz?+q>rB&l*+zOF;xC@oW>{cc?TX|gdo$3a3+!e?7r^>4zxA?C0 zfLGBdcnn6l`!p(AzraDN56!>~vbs|O&oAtAin+qvG0^oZtRS@TTH~ZAA`2fio|>?NkkM`n$NT|QVH>a=xyB*7!MP5u|rW01trj51L= zFOy|}^+J|pl0}rGqUcN>z){&=Uv7WZSL5ZuE`x|iSdiYW5u0Y_)tIA+nxPE-@~Rkt zEHytiJtn?_Mx-J%Ow6x^%##?XC{l_u6OnXIux{0tGm9fxu?o>#Oes!^aJ8|^$JxTkg-Vs>L)pYQs{%J7Yg_#R|%a=lskpfu{mF8x{k#PK1hEv5#50} znjDdiH^lHT=(#lZ90)Mwsqhn{#XvBO4w;}>DYKchQ%slN@R`Y+yID8ak;{Bp~m{Sk@%x%tycg*(37l`!@F}k&x)g&r%dg@*!P5x#W1QW}%`;j^BdbArxI$8Lr_>vE0 z+E$7kCxd{62a~tki>V^B_lgtY#g}>__-LDCIi|;_36T`Xe{}IJUlP;pH4Weha0UQY z^f%vps!HC9vlf+)#~gpN&j1GV3`0iLoYhqA#O?_kLGR*ZBogo5MUbw9X`Y&td5Ezg zefJ>0!@&O>B=0;Fl_(WQ<^$Q$m3q*){7$blR1Jt}v67P0Tg>`3+zC8`y~Dbj-^aro zDL{cZ#SY^SK!@_69TtGxpTfZy0+Kq6mvR@$P@Uo#r-dA}M5})iAva@{*E6tHFg;bO zY=N7(VMPYcv$h^a^1$z~QSnfEkO!QgsuysYsiz*r8kwrZFy|?$qw#QqJ&^CII^!+Z+B6(>~ig$ua?t{NoFftLhHY*I4hmC4Hw z9~IX%%vpo2IAedf5zJ9vkZJu5i!V<<5fe}e^+z*c;E4$lD=!B(12K`Y-)o2j-)JYU z*e1P%+eBaing~??hP9R;S6uGA^d$&Ak(z}RD=ZkPqR`Ah3Su&HuE>T_fs)Qrp-`Xb zmr|f1evaZN>m<~D-$awRnW_rPy-K&Y(6w|VgX*dEs^xz|>2cK3O3NMKJFW*&?HELo zZ$VggBFsn43oigyr0|eFOw01E<$`&L){0PI^(>>e zG06|vi?n~isU&$Vyf*3%*G8UQ3!XZzUuH%HB=dmw%F=NrVOYjL3o_*yajSiBSULq| zulh(-q%I;?Nm7uZQk$h?nUWEa&&I1o;L{W@1(>^8{<@0xg^XE0lx+Pes@+CvKFkA# z5!R`Mpo6|RRa2I`KdERb4Kvh=RI{q(o0!ldq%wcCRDafC4|ztnH9Q#>B9pf^x+G)X z5PXG;{xxZ}R2PJhs@qhqejPk_9)vW(%Hxb4gCba=3z1E^BJ^-BSpecq9RglyCU|lk z*me2}c?JN?1z{ng#Kq_?#ZYtChInG+IcBJoAC%qtB(^01C;+|89yktL=CMy64DK~zF(8ce24 z7F`OaaXdmIgZRj2bf70np{iN8Iznq^=!LK*nP%~PE@wHG_4!7sG@$H&CM_>b3x&0^ z97L8>%L?PCO%`=e1)X>u-u)ofvS=HY)|P*nPfZCL+-AA1t5;Th6WVg9(q=}^Z)c6_ zkf~Xs7s95wPIsB}uz ztg$4Rd~&%gyH+}>s$#Ethp8Q=uhe@7%F8`^!PI;(pk^pz>upupV07r~MIBnJVaR_g z{mNr|fZ9yEkc_oMlg)LIUP=pv(iltPM(R{d{n|zkhc#tSs&x9NGR<$cGD9B<`KZ~1G;wlD7R<8;!ROX8I z9zMvui@1kAIfO?+P9*@Bv3#i!mr8!QHO_0wyGjW@rP+NAr<;F{YXw9M%}ToQ zxQkfs7A(*;ERZ_gbG`nc-@O`KyH1E+j&XHZ*;wXeFB1Fpp=aRk7x?u{MzepRvp%bS z^&tk`Ookj>mF%Xb8$dYvR$svQFO}DokK%cjR*zFZSIg492|k6S^8_e+&%Qf8?!G?n zCWS!YqJ&plR=oLf52JF4;z~^+@$-1dHd!2kq#oJcR)@grbLe?zc+LlZN z9i3+CxWub_ypE1BHxbV0Am_gh`@aM3KLx>fy3EJWfXXxREOSEOQGlOUq1X#x>#O_j zha|_kvC};Jt*n~>6TU2hcz8wm7%TZ#66s66>!MU|IZlg@_+05C(kD^M&IKKm-=EVD zk30!t(BiViTu2jj8vK8@N>$JU$8ErI{r+9Ae|6>JrVlwfuYrsz4GBFmu2g*?to5ow zt`98~Syk30;NJB-h z>1N(B)?;8H#6pLGkQU0Ut!%Y2Z9#y)VpibMD4_Xa-~mf`G!cI?gD|cugaJ`Wz@JU{ z0U84Un2cFu(;@B{1!IbK&E!X9Bfu^)7#}`gBhyB735ijl>_rVnfi03n%0PQxcNuSP_?%N!uai zf1s?%Auw6a75jh9;*khL*}E*;u34HQBA)~rGjR`d3`G|s~jifFmXF!$q}_M=pJp^w64R+jUsUIKQeg*9E$Q|(1e3)Mkl;=u1;hu`md z*Vdh|-@or!k{K!NHcx;s#$H}lm|RBSMv9&kK|*h`r4@gUeoM(Yp37hZ;F&N-hrtpz zj7p+ZS@6o|KkhZfGUx&$)q3_I*_T2>f=4`U$ZHFXKEYp5C4b0ekdNf=cu2;O1okgZ zp%jbtrP*+q@wD!>P7Smz^VKpZ=?jmWkuKg{-B^P2;u+%*$oY=)>YYgA08};-lGvW%*PSS@m^lFL>E$&ej3L_r8d2Q^kmz4Q`I z-Bb2KJuigoOM;Q+0Vl!xqrOYM7h^PucVq&ml!6~fDqIb2*y|I(xxDa{}jVzi3 zrIllOTFY8(`STMMQw&o-Fko8-yu0pRUD`33Ag+JsWT07IX_v`RVPXm+@PXZ^qe8Ky zM>T1xQi5)^}=gEa47K=fJZ}&p-i<%_+OgV;Vk_sXX(W~T%PX--IL?f?#bJ;?uo^W0Ko1C3;uS_%(SY5{d&tqN8>rKmz=8OA>7SVDD2BLzcV@C*oM`jQXPRM!W~ z>(}J}pSoA~gF8!|q#ysk|JU;~8VW0Q*nEFlX0U8tQuiRbZ@vG(-d}xyt~8fi-~t6F zA1z#vNC)Am&M{v|V{@n|i><9t9JuGJaL;A$>dtlXp68&JOAit0YyieyT+;gp*3+U0 z^`{c)5Q#68|CLzj9`7iq~#m__Ch&q!)gJ{Y5{8tt;YE$YX5DNj!E z%xA=xK%i6=uq=jv!yS+FA|K34iu8Z2>>zy1ZF~9;Hx%y;RuZ&}vu6jI?C5lQSi=2b_P<-<+O!>0);GScoOgvrv1@ zmpza=yi`X4)5uXJH!z*A@asZVzeBNDRF46mk~E`Oae0dw$*1X&G&#n~);@odD&&YF z(I4@3J{r(v52m!=LHvCc@%QoS{_dy2eYZcb?%2q}s#!8`*D!DCS`8m6!B&VbZIS^_ zG3FcPG{?$`fIRuUI^|;lw_Df+a1Bobl8BWDdd6yQ9olrVRu6toj~eNHhxX75{Zxs9 zJTY(;nK_#V$*7Agy&&s;xL|+7sTE{@V7V{Ea#z#|1w7UA&s-FtU?n=vaSqEHldC$l2 zml~)f{iMgcn&?cutl}&a!)c_h`cDl4)812tRB0v3mo|QOY!qv@7fBwuvEd4%cbIDp|4+RFJo#Q&LqEdbf&UCqj!&T zzXZ?SIc0oNM|ej&E%AT)+93roUT9>*5b;_ZreEF&eP9sD3xn=EXMpC_V9E5RoNQJ5 z@&hK}LH$f#QFTh5$~}KV%PD!6MW35c-UprDW{8Q3bW~YDw^HCY3_$>HkV%fpA_TR^ zAj&C{qU2dFb&v>p(L_*}b}Va}@wc{9N6aRJBrkfijZe zkw{Oos;&zqi)0JF^1*i_Oa6yqz8&S7l}8vJv5(q;F;B!46}x}O;t8ANVeD)|!NuCW zOa0*=Fy(`9<7+aL9Vg(7^jr?Cil!9kr8KbE*LilZ(@Ob1mnTdH47V2&zj z5>Z!Oc?&3M{YA}ot4buR|@S`mUJ8XZ>Vc}h=+Bp?JoitL0;L8&g zxG{bz`3=x+0k__{vCqlbCQ8m_d^|QeehyEuz9uhJg6VCyXeHF%JU%SqO&=E06DCF! zwseEW4H@_0JdlCL9|ZgwEsoey=jBLJOg=ElRsKyAivnyyZ@wxyj7-!F-7*csfktLT zYk`f!dD(yRyu9vxxVW=5_3I*N7%75z>p`VL$x!xwN-vV?;-w0Y18#||2N_j)vJ`J@ zG1&lBqjbtX29qh3nakm{l6v_CKBY@wF2nNsKV#HK_NZEWv1y`T1d!MvWHCOPVGe;T zS+R`NzVpk)$KIXw>_Yyk4ef&T>EVD9t30v}-rc{!vLfB3fi0Yd-t|KWjN>4E&s%5k|8d}+% zcsydKO1U9(wYnqSU0>=Kq<96!OEx=~X#n6}4cs3tFwY3wh=6fp0!^|HTY#-gb1Q7lxte#~KjR#II+Y1t=J(!Dwii%XakLgkGkw+nxH z_%dk)h3T5=7o!8Gt;1=5so^C!>g@KVSi=hI{Y6C)7Or3O5_Qy}1a9L{JO_BB8Aq@> zL5tf`r(^@_K4CXTq{%mX+OlmzZzu%IVYgbcHc`a^<&jC*3rgIiLS8#2+Y6<*06glq zth#FJOL=0G@269a`0A)Uj#ays$cBGMp5Eu6Ah zrrwke)hnj9SQ>wIrsqYWt5qw(l7EMy09A+SP((O^14n%wj_Tj{e!f`dshc7I08|x| zui;+3LqZiwB?$Yu@`mU_KJukhG_vQHPD@2Ono5{&8dyzpSjC^*Q9=wp71j zT_!ohRD|R1C`cR$T@S~Y_ZWYZ)a&*>eY*H?cVqDfwX%lRFa*sgcDpeifc_&pf4=3? zDu<#F7nI&^cjVrr3ZgL&<=abqYDPD__yLYC6)2aQe5LZ0hLGaX=;Nj5h==>|SFGZMCQ+Z&lu?%Wi(tEM&o)Sb-Ll1wFs`yFiYA8>v zl+`>t#`nc9%aJtr)H?}~w}?~u9FD&130*$o8Ad>3NU9!vqB#TSLry%IJ%px@wT&^o zIR6YS2Y&pT{OEkpq1$YQM>3*0-&7PPubx7ty@PMjB2$WNE@CXbL$P(sc`!g8i%Rf!sAK{LP+NqcNK7byZBz!(4YDhY(47@Vcnex2{ zs#tPYI`n0E0aTmm6}ymm;V=nMD#Js(MB7z5Tt(wB$1Q*JKH%sCbQJYa0L%x`i=>4L zQ{Z5hLlx$0C>SXU>N?gcLw-T4M39q7CLGCOs070*WNur`btit!Wi1$T5xPpf?kaWO z#ZUKvRm%f@W$<&2U>r$Ok-3>Y@rA6!RV_KmvnjNwCvqv}iA_uSelY_BzQNPQ^srda zV<4V%ss?|%0PxNdA)(?#G1g$Rt96;X2_+xH{1?dU(|DfBa>_%%EF}b(p;ui!Fq#I@ zXI~B5R+rbE#kG1ns%kO%R0I9OR99m3ZUk*)RcT-;=rGjPAt)F2C~56}Tp@fFB#zfFI2mO1tMK_riXl5AAcG7%4pjtUwp z_e05>mJ^AKR zsY-unb%XL+z#f1j?TEd@aLf|%tj&%AQLvSGL2W9ZMVWO+_-J5X=s6X`&tYJ_h9|n{ zw!(Knxo`raC#JKBimb6F@w$EqC_^W7Mo!9mS4qp6szQyVNbC!?L!PEZnPLaZD*)_( z{4FB?oixz;Az$wK_z!CgNxj{NC z$*BSg8D2^xkYQn;#WW5_`c0{cm!~5_Crg*Fn>m~{lUx-}iB)*2`fL)#^je6LlB5(3 zJ5zBxFk`K4Q8LYh^7-rQ(!LP&XKtlN#fmzC3Vit)Nrh!F22Bj^| z6yL_bxEQSPp6ky`q1{{+@>rU^6OkAP-Wwr;yn2u@URCoaR0n5qBo^{XXbLQ&64j@m zK1yY99;?KDxX&XoQBUDBter%G^;Cc5QUBSoRLi1*Qaqc_wps@K_`5bV7Q z*Sd%Mm5&%2h9OY>zT$LI>tfdY;x5f~O>$$Q*Fj?Ci}YOksmpumh}|dyB;9|^@-(L) z-@;@MY=L_@!$)+o%o-(5*Z&@~JR@e=8*+y8X<*EeHYKr{dE5JO7?ORX6D0`7#tJS;s<*9%j*j(+T&7YJ!MEF%#}W37s|$1JcYsUEFHSI zBauRkPMkoSrR_}DT$ekU1(Rt;xmFEvRpM2LopXQa(qD-%BlFCJlFWaV3Dy6dD8-OT zK#fJCsLGv6ktuqT#&)Xx1Vtf;`!8wWP?tD%Fvqh?VklLhWxTY8N=d!N{tZ&yZJwvDg!$eBd*2j{#a%Arow2?xuUv zSMt$9ng!`40c@`F!xU9*Ox{OIWxSN0Qe00eS9z)=k>I|2jKhD&qGIO+=5oX?o;l`i z&{-MfJBUPZZ5k#bO3U&*3Gmt1o)Gb4@Bg^5qAWl1-|*cp9;G+MI|?=cx}nAP1%2eO z8y2Y!r0d+gr&Kj$%pT%Mt_Yv;(c8HoRhfZhBmi3T^3URUU{RM1 z@gX_c`sKlFuD5??d&=T95ngd&$Y1kdE+77pGA!k=pxpn`E+ke>G4|(Xf_~r61WGk2 zD^}(W|7{%LHS`7bU~@z{nu7=dtdS38Hr8@>UW%Wtrsq}LS-!-~1bwtGdlFBQJ2;Wl z#`CE$1jkB%H6DC*LoemJr8;72Lz##(^N0#t<%uSegz|rrjLIfhyZWM1N%w?A^u`Qh z?QEr^kb(4~ZWeUQauIG4-7M~+EfX{g^iU~%5hKyyXbNCq*zKO+@iIuK4}c6Sq&1xe zpZODq%Z-Atgv(XoLL{>X7V3^MTbHVAh7ZKmO=_fV8SKRqr|K23#ypb$et9IN+4A>g zlO|coNT+|GaB`u$9jXLT+UFRgs-P9s%_0Tf&>qJ`x0zgy4r$erRenD)Bp50kjv7{^ z+%r)=!?HutWslubom>gTmFXA;Ok^{oAtDjX(@uMf*^?`n*s z$qs)=X+(J8E2DrKwL3A8a;PdSsX}z~d~XatKgM`%3@IU%*Dk;t7a! zxLZiyGOiZt18*JDTPE#w()AK9CCbNi3~4zLp3FoL#gxh~k;=lo?=aQf=`n?$z0~IxZm^C{ zmbfs{;^Zv_h3>m!8J$GoP0Djnl(RZ5wMrB5zEDRM_FW19VJ~j4Y;kFB_gIP56j?38 z!c$digv)n*T$y0#frT7qDH0I>R8_G9vGmk4P&8#vxIlsMU^V+glO&K8p?RQ7JGzuCF?~QDTobQ3mEu9)-SX}!n{5;{s{!woP1L1i zXU0FIO`{Y(g^{~+bVXrRHPa`{c&ZA>n~Qj=n z4uMh*C;1*dExVGmWkEW5(Z28iOhA8zPno}0z2cQsVWIa79f;~2+M^(5#Q&X`U`Y6K zjxt3YZ)+*x06zCiMk?n(QU95q{!3bs;~vyB@;IqS%X@<2K|fC(ZSEd)htA(iXjL{Y zlYP4M!p>x)vtESDAi|Qtcpk=Crt7{8b9sS%M5|aTEpe3lUnQhwFVwvDCB}bYpfcC` z%s#r^YZofnMol=EG|ZT+xJB%sdG?H#74Zx^VjhR8`hu#>%Ct94$BBmMA(f8^=r*f} zE+6K}`xVBiNZFN^M%@<*BD*deHyo_iCLbHk;2LjAw^d^`_tY6M_^+!=tEg4UpYm_N z=5hAd|3Yo^YW(l=FOUuRmCJt_P1ULs`9ug9k(}1@hK{8V=Q1C)?B$8lUW`?jWp!#K z9(6>I*$n#q%ASzrK7I~x$O(FWt!sI?ku8-acex=G^<17xZcquIh*DWRU_ue92PEGf z>B29S@EVE@5XE>p?fgiZ%c$->evEdvDLx6~d-I&n@$lW+-!>YEGrmP@)4k^t61p_+{*VZOlFk^V*eY=Y3UR?AQ(zbwg8u4reyTD(b_b z-G5?NS)knQ0KAfTl;=~dsL<$5C~S&hHXFg_i63iNB zHh##AI!hq|!_YD~1)5z1QY)L+ zN_H2wWSo}!=3&n9{33lzCjTdq920UyjeqIwvq+CcSud$Hrhg;niY)uOeYJSGIQj0p zJ+{+_Vm88wwFH!Ds=^_!n!z{W_MyGUt5!Ue8)dc-VaKlc7~!<}*UE;sZoLS-|3i%; zYI2Xdit!N5PE%(89$_3Yk15P&Xh6ooBobyR!ZY<&w2?54gn5ea!Dw&IMT*DBAb)ux z;^1c;mML(rM)C-o#TfZlEQ01SG)jS9Ol=v&b<1Pp;hwS5Oz^O%#X{Uza<{Ub@Dk3} z@y(F9t|Y0i&)|248)>$O7>c_~lFIwuIdD#0-B?^+a%wN`K57mdp@Dx1f(yShD%t6y z$K4XJ{0&e`2MD3s@bT{f006WG01g09O9KQH00;;O0OdOnm$V57Eq_aHgD?;V;1l!? zmiNU#5|UIg*;JLXZPNo-Fgz5nk?lUXeXT@IiPVm|K(j()sq5F zPokJJ(1j^mT}%FYe7fIo=DgCS>Wl`-M{soXo|NU zwEyJ{@nP)AH2^+@DqDk>{JP}C`Lc;ZDi?ofVq(o2)hviLNsMw*V$K%Ttf(JOigK3J zoCM{psX0rOlTmXPC}&QM4}0N9axO26=o^}~nVcWHFu1RXOH_>=KkI05jj~X_cpJVd zQ^j-{!;tq5hS?HhG7LjKZC!gzlUEeKw0_<~8T9?)jRrxGT1+W*xI{2cU6~meDb+=p zAh7XLtAOB8he1GHq?;F=QRjofK!ePolhy8GRh?E4z} zN1OBAbAG?yIp=K44-|qI<(xQ&U zWgJ2Eja3&7*9W_vr>^4sYDlUr=ZNaz+_K5e;Y}O3vp3g$UnDWz8UO496G&0~q$(;I zh}}}zU2W<;b}qPK*5X5_ony}R_`X=7(_b$b$+)mJpX>Rx_b;73i7R7GHTQT+3yHAnYIqn_j)jS9G>)kR0u zO6y$tpt~kJ`1aRJ{;J3_Je6OIiM?85T`fp!Y;<#9H=nDnH(T>6&(BPKAlCD1|BkMN0)aRTx#DB6Yv^6vP>EWOTt^Q?2vB2B? zcuSRR{pHU4oMH2$yN14}U!*wgFx6%RL`v?Yp(Ljr_YNAfi%rJNvL>o8tueW6yD2#2 zO7sHjwgyYpxb#JQXLx^kE&pLp@rT^|W5?q%#{5#wP1N9T*ITy-4BQ&?>6-GOTQ*!@ z(0UrTY>tp_nG;6>B!I``fyZwO&_g%qfr8v%An6>jvRKx)3@iG7r={-9kYbkA&9cM- zrf0&mbxMedPYPfV!6eobmbF00Tr)GQWh5k21U)!DA~bS>k}V9)%}94hEy2x4qrHaH zwuo@*|gnTh3Y+Or+ zdRX2vx}X>_bR{e6>6KU`?QZ!cfeLX{GUcD47{!=JIF3q|=Mp${PYh*5j$ogDr6->M z`s${moc(!7Ab|mdP%puRLlrhD8OK~uzQiu2lwNsulqheK*p>It2Q4i&DxMU|2#B8) zAFXIDZ&M+o6uJ`n=&Gp*3ad0MbyONMVGBQr!-=ckO4;Xm_=nr`j~$in{fAWI^-Bsp z!@z{>6(-{@^>RYl3ppwjF0*S`EyIVGdplW1cS^z{X6j;QcFyK^W&<#E+fflzb7-`= zs2Y>_(Y-8P!VhhhIRSLo#i5sHv>ciO`RX_n@{-#{g~%~`rGaY`l_ZBU0u%O~w!wb@ zfU=uBpk!?c{(D?BdV-RoIyn@QDomupHJ7kYFy3f*v;gB})}lvp7)B6xocbdw(+_~j zyTAc)XZS1|;!1_RS??=wThvB6*b^O5*fpJwy(0PB3xL6PM+9wx4M7t&Q~AcvMjo75 zUuKStLanq@OwX65$4j%*Hs{(!<}0C)B*Yw5%uc&$EoCcbmlDdI>8_Bm3uw0rO1UjY ziq2Mrlq!46nE&d}23oeu4zy7P<%Bf(%$~$RF5Yo&0Eiit1|X=ALK+X~TS)UUpARK0 zxAMId$W2#oOHJIGoD^r?nwFWeZKk57y)w?Lgm}M|0`LY40ruGt%z5d_GlcpG5*Uvj zz?~Iq{SBWF9?+BI!n}>DSZ