Customer Database
A database storing the personal data of all of the customers.
Risk Table by Threat
Understand the potential risks to this system, broken domain by threat.
Threat Event | Likelihood (C | I | A) | Consequence | Impact (C | I | A) | Risk (C | I | A) |
---|---|---|---|---|
Ransomware with encryption and double extortion. | 4 | 4 | 4 | Data Protection Fine | 4 | 4 | 4 | 16 | 16 | 16 |
Risk Table by Impact
Understand the potential risks to this system, broken domain by impact/consequence.
Consequence | Description | Impact Score (C | I | A) |
---|---|---|
Data Protection Fine | You get fined for breaching data protection laws. | 4 | 4 | 4 |
Cyber Threat Graph Context
Explore how this type of system relates to the wider threat graph