Security risk analysis - 3SE
Drafthttps://www.3se.info/3se-onto/terms/security-risk-analysis-3se-069c1ab34bae7b50
Risk analysis which is relevant for security engineering.
It includes the following steps:
(1) Identify the assets.
(2) For each asset, evaluate its severity level.
(3) Identify the threatening situations.
(4) For each threatening situation, determine the modus operandi, the threat type, the threat group and the impacted asset.
(5) For each threatening situation, evaluate the likelihood of its occurrence.
(6) For each threatening situation, evaluate the targeted security risk level based on its asset severity and the likelihood of its occurrence.
(7) For each threatening situation, decide the security risk treatment: avoid, reduce, retain or share.
(8) For each threatening situation, evaluate the residual security risk level after treatment.
(9) For each threatening situation, determine if the security risk treatment leads to a hazardous situation in the same context.
Relations
JSON-LD
{
"@context": "https://www.3se.info/3se-onto/contexts/term.context.jsonld",
"@type": "skos:Concept",
"title": "Security risk analysis - 3SE",
"description": "Risk analysis which is relevant for security engineering.\nIt includes the following steps:\n(1) Identify the assets.\n(2) For each asset, evaluate its severity level.\n(3) Identify the threatening situations.\n(4) For each threatening situation, determine the modus operandi, the threat type, the threat group and the impacted asset.\n(5) For each threatening situation, evaluate the likelihood of its occurrence.\n(6) For each threatening situation, evaluate the targeted security risk level based on its asset severity and the likelihood of its occurrence.\n(7) For each threatening situation, decide the security risk treatment: avoid, reduce, retain or share.\n(8) For each threatening situation, evaluate the residual security risk level after treatment.\n(9) For each threatening situation, determine if the security risk treatment leads to a hazardous situation in the same context.\n",
"status": "draft",
"subClassOf": [
"https://www.3se.info/3se-onto/terms/risk-analysis-3se-069bda7c99d17d32"
],
"closeMatch": [
"https://www.3se.info/3se-onto/terms/threat-analysis-and-risk-assessment-21434-2021-069c1ab34bb77d01"
],
"@id": "https://www.3se.info/3se-onto/terms/security-risk-analysis-3se-069c1ab34bae7b50",
"related": [
"https://www.3se.info/3se-onto/terms/asset-3se-069c16c95ac27b16",
"https://www.3se.info/3se-onto/terms/security-risk-3se-069bdd80b61570ed",
"https://www.3se.info/3se-onto/terms/threatening-situation-3se-069c1784758674a5",
"https://www.3se.info/3se-onto/terms/context-3se-069c1b6f066d7c1e",
"https://www.3se.info/3se-onto/terms/hazardous-situation-3se-069c1b6f069e7ff8"
],
"entryCreated": "2026-03-23",
"entryModified": "2026-03-23",
"entryCreator": {
"@type": "foaf:Person",
"name": "@rcasteran"
}
}
Raw JSON-LD: index.jsonld
Created 2026-03-23 · Modified 2026-03-23 · by @rcasteran