Security risk analysis - 3SE

Draft

https://www.3se.info/3se-onto/terms/security-risk-analysis-3se-069c1ab34bae7b50

Risk analysis which is relevant for security engineering.
It includes the following steps:
(1) Identify the assets.
(2) For each asset, evaluate its severity level.
(3) Identify the threatening situations.
(4) For each threatening situation, determine the modus operandi, the threat type, the threat group and the impacted asset.
(5) For each threatening situation, evaluate the likelihood of its occurrence.
(6) For each threatening situation, evaluate the targeted security risk level based on its asset severity and the likelihood of its occurrence.
(7) For each threatening situation, decide the security risk treatment: avoid, reduce, retain or share.
(8) For each threatening situation, evaluate the residual security risk level after treatment.
(9) For each threatening situation, determine if the security risk treatment leads to a hazardous situation in the same context.

Relations

Relatedasset-3se-069c16c95ac27b16  ·  security-risk-3se-069bdd80b61570ed  ·  threatening-situation-3se-069c1784758674a5  ·  context-3se-069c1b6f066d7c1e  ·  hazardous-situation-3se-069c1b6f069e7ff8
Subclass ofrisk-analysis-3se-069bda7c99d17d32
Close matchthreat-analysis-and-risk-assessment-21434-2021-069c1ab34bb77d01

JSON-LD

{
  "@context": "https://www.3se.info/3se-onto/contexts/term.context.jsonld",
  "@type": "skos:Concept",
  "title": "Security risk analysis - 3SE",
  "description": "Risk analysis which is relevant for security engineering.\nIt includes the following steps:\n(1) Identify the assets.\n(2) For each asset, evaluate its severity level.\n(3) Identify the threatening situations.\n(4) For each threatening situation, determine the modus operandi, the threat type, the threat group and the impacted asset.\n(5) For each threatening situation, evaluate the likelihood of its occurrence.\n(6) For each threatening situation, evaluate the targeted security risk level based on its asset severity and the likelihood of its occurrence.\n(7) For each threatening situation, decide the security risk treatment: avoid, reduce, retain or share.\n(8) For each threatening situation, evaluate the residual security risk level after treatment.\n(9) For each threatening situation, determine if the security risk treatment leads to a hazardous situation in the same context.\n",
  "status": "draft",
  "subClassOf": [
    "https://www.3se.info/3se-onto/terms/risk-analysis-3se-069bda7c99d17d32"
  ],
  "closeMatch": [
    "https://www.3se.info/3se-onto/terms/threat-analysis-and-risk-assessment-21434-2021-069c1ab34bb77d01"
  ],
  "@id": "https://www.3se.info/3se-onto/terms/security-risk-analysis-3se-069c1ab34bae7b50",
  "related": [
    "https://www.3se.info/3se-onto/terms/asset-3se-069c16c95ac27b16",
    "https://www.3se.info/3se-onto/terms/security-risk-3se-069bdd80b61570ed",
    "https://www.3se.info/3se-onto/terms/threatening-situation-3se-069c1784758674a5",
    "https://www.3se.info/3se-onto/terms/context-3se-069c1b6f066d7c1e",
    "https://www.3se.info/3se-onto/terms/hazardous-situation-3se-069c1b6f069e7ff8"
  ],
  "entryCreated": "2026-03-23",
  "entryModified": "2026-03-23",
  "entryCreator": {
    "@type": "foaf:Person",
    "name": "@rcasteran"
  }
}

Raw JSON-LD: index.jsonld

Created 2026-03-23  ·  Modified 2026-03-23  ·  by @rcasteran