by hvale vale
Threat is any negative action aimed towards a person / group
Probability is the likelihood of a threat becoming real
Impact is what will happen when a threat is realized; consequences
Risk is the intersection of these three concepts
required to avoid risks or minimize the impact of risks
Risk: |
---|
Threat: (Be specific. Name who is the source of the threat and what is it) |
Probability: (Low – Medium - High) Vulnerabilities – What kind of information is readily available online about the person posting opinion? – What are the vulnerabilities in the used platform(s)? Capacity of the individual/group threatening – How many are they? Known Incidents – Have other people with the same opinions been targeted? |
Impact: (Low – Medium - High) |
1. Accept the risk and make contingency plans
Contingency planning is about imagining the risk and the worst case impact happening, and taking steps to deal with it.
2. Avoid the risk. Decrease your vulnerabilities
What skills will you need? What behavioral changes will you have to undertake to avoid the risk?
3. Control the risk. Decrease the severity of the impact
Focus on the impact and not the threat, and work towards minimising the impact.
What skills will you need to address the impact?
4. Transfer the risk. Get an outside resource to assume the risk and its impact
5. Monitor the risk for changes in probability and impact
This is generally for low probability risks.
Preventive Strategies
What actions and capacities do you already have in order to prevent this threat?
What actions will you take in order to avoid this threat from being realised? How will you change the processes in the network in order to prevent this threat from happening?
Are there policies and procedures you need to create in order to do this?
What skills will you need in order to prevent this threat?
Incident Response
What will you do when this threat is realised? What are the steps that you will take when this threat happens?
How will you minimise the severity of the impact of this threat?
What skills do you need in order to take the steps necessary to respond to this threat?
The Risk Assessment presentation is part of FTX: Safety Reboot a resource developed by the APC Women’s Rights Programme (APC WRP) as a contribution to existing training guides on digital security but rooted in a feminist approach to technology.