You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 6 Next »

Homework for all T7 experts

  • please "claim" a row in both tables below by replacing "xx" with your initials
  • fill in your assessment regarding probability and damage of the risks as per the risk assessment page up one level
  • find the categorisation and code copied below:
Probability of occurrence Potential damage

1 == once in 10 years

2 == once in 5 years

3 == once in 2 years

4 ==once in 1 years

5 ==many times in a year

1 == Low   

2 == Medium

3 == High

4 == Very high

The "probability" table

Risk #Risk nameProb.Prob.Prob.Prob.Prob.Prob.Prob.Prob.Prob.Prob.


[1 - 5][1 - 5][1 - 5][1 - 5][1 - 5][1 - 5][1 - 5][1 - 5][1 - 5][1 - 5]

ExpertCGAAERxxxxxxxxxxxxxx
1Fin GAFAM555






2Fin Technology555






3Fin Marketing455






4Fin Environmental Cost112






5Fin Funding433






6Legal Governments 323






7Legal Compatibility333






8Legal DID misuse555






9Legal User responsibility555






10Strategy Dependency555






11Strategy Intermediaries444






12Strategy Exposure555






13Strategy Usability555






14Strategy Acceptance555






15Strategy Interoperability333






16Strategy Integration333






17Strategy Ontopiness333






18Security Protecting data555






19Security Loss of Data555






20Security Darknet333






21Security Trust Infrastructure222






The "damage" table

Risk #Risk nameDam.Dam.Dam.Dam.Dam.Dam.Dam.Dam.Dam.Dam.


[1 - 4][1 - 4][1 - 4][1 - 4][1 - 4][1 - 4][1 - 4][1 - 4][1 - 4][1 - 4]

ExpertCGAAERxxxxxxxxxxxxxx
1Fin GAFAM444






2Fin Technology122






3Fin Marketing344






4Fin Environmental Cost111






5Fin Funding233






6Legal Governments 344






7Legal Compatibility333






8Legal DID misuse233






9Legal User responsibility333






10Strategy Dependency222






11Strategy Intermediaries333






12Strategy Exposure144






13Strategy Usability233






14Strategy Acceptance222






15Strategy Interoperability333






16Strategy Integration333






17Strategy Ontopiness444






18Security Protecting data233






19Security Loss of Data444






20Security Darknet111






21Security Trust Infrastructure444






FYI: this is the spreadsheet where all your input will be copied and visualised:

  • No labels