Crisis Mapping and Cybersecurity – Part II: Risk Assessment
Title: Crisis Mapping and Cybersecurity – Part II: Risk Assessment
Author: Anahi Ayala Iacucci
Source: Diary of a Crisis Mapper blog
Date (published): 14/12/2011
Date (accessed): 15/12/2011
Type of information: blog post
On-line access: yes (HTML)
"I have a background in human rights and humanitarian affairs, and in those fields you do something that I realized was not that common in the ICT world – or maybe it is just under reported – that is called risk assessment. How does a risk assessment look like?
There are several components to the matrix: there is the risk, the source (sometimes), the likelihood, the mitigation tool/measure and (sometimes) the independent variables. I truly believe that this matrix can help in understanding what are the things that we should focus our attention on and what are the things that we cannot change or we should just ignore. The very key factor in the use of this matrix though does not lie in the matrix, but in whom is filling it.
See also:Crisis Mapping and Cybersecurity – Part I: Key points"