A registry of risk scenarios cyber systems might be exposed to. To determine the risk a given scenario poses, you should assess the impact and the likelihood of the scenario occurring.
The risk scenarios are focussed on a specific type of component of cyber systems. A cyber system as a whole combines instances of different types. The risk scenarios, and types of components covered are expected to evolve. When scenarios are proposed that are only applicable to some subtypes of a type of component, separate lists for the subtypes will be created. More detail can be found in “Context”.
Risk scenarios are described in YAML files, with references to the topics they cover in standards.
This registry is far from complete. The hope is that it will grow and become relevant through submissions of many topical experts. At some time, a governance structure might become necessary.
Execute
npm install
to install development tools.
After install, .JSONSchemata/RiskScenarios.json
is used. You can tell your editor to use this JSON Schema when editing
risk scenario files.
YAML, Markdown and JavaScript files are formatted when saved using Prettier.
The syntactical correctness of the YAML files is validated with
npm test
This validates the YAML files against Joi schemata.
MUDO: A CI system should be set up.
This repository is set up for use in IntelliJ IDEAs. Support for other IDEs can be added.
Cyber Risk Scenarios © 2025 by Jan Dockx, PeopleWare n.v. is licensed under CC BY-SA 4.0.