Customer Database

A database storing the personal data of all of the customers.

Risk Table by Threat

Understand the potential risks to this system, broken domain by threat.

Threat Event Likelihood (C | I | A) Consequence Impact (C | I | A) Risk (C | I | A)
Ransomware with encryption and double extortion. 4 | 4 | 4 Data Protection Fine 4 | 4 | 4 16 | 16 | 16

Risk Table by Impact

Understand the potential risks to this system, broken domain by impact/consequence.

Consequence Description Impact Score (C | I | A)
Data Protection Fine You get fined for breaching data protection laws. 4 | 4 | 4

Cyber Threat Graph Context

Explore how this type of system relates to the wider threat graph