Likehood |
() |
Threat agent factors
|
() |
Skill Level
|
|
Motive
|
|
Opportunity
|
|
Size
|
|
Vulnerability factors
|
() |
Ease of discovery
|
|
Ease of exploit
|
|
Awareness
|
|
Intrusion detection
|
|
Impact |
() |
Technical Impact
|
() |
Loss of confidentiality
|
|
Loss of integrity
|
|
Loss of availability
|
|
Loss of accountability
|
|
Business Impact
|
() |
Financial damage
|
|
Reputation damage
|
|
Non-compliance
|
|
Privacy violation
|
|