Software Engineering KB

Home

❯

08 Security

❯

02 Application Security

❯

01 Concept

❯

Risk Assessment

Risk Assessment

Feb 10, 20261 min read

  • application-security
  • threat-modeling
  • risk-assessment

Risk Assessment

← Back to Threat Modeling

Evaluating identified threats by Likelihood (probability of exploitation) multiplied by Impact (damage if exploited) to prioritize mitigations. High-likelihood, high-impact risks are addressed first. Risk assessment turns an unbounded security problem into a prioritized action plan.

Key Properties

  • Likelihood Analysis
  • Impact Analysis
  • Risk Prioritization Matrix

application-security threat-modeling risk-assessment


Graph View

  • Risk Assessment
  • Key Properties

Backlinks

  • Threat Modeling

Created with Quartz v4.5.2 © 2026

  • GitHub