Skip to article frontmatterSkip to article content
Site not loading correctly?

This may be due to an incorrect BASE_URL configuration. See the MyST Documentation for reference.

Introduction

Risk assessment is the engine of Security by Design. Without it, security decisions are based on habit, fear, or guesswork rather than evidence. This section introduces risk assessment as the structured discipline of identifying what could go wrong, how likely it is, and what the consequences would be.

We begin by defining exactly what a risk assessment is — distinguishing it from related concepts such as threat modelling or compliance auditing. You will learn the standard terminology (asset, threat, vulnerability, impact, likelihood) and how these elements combine to produce a risk rating. Crucially, we establish why risk assessment must occur early in the design phase, not as a retrospective tick-box exercise.

From there, the section moves into the practical work of risk identification and analysis. You will learn systematic techniques for uncovering threats and vulnerabilities across people, process, and technology domains. We then explore how to analyse identified risks by estimating likelihood and impact, using both qualitative scales (e.g., high, medium, low) and simple quantitative methods where appropriate. By the end of this process, you will be able to produce a prioritised list of risks that directly informs design decisions.

Learning Objectives

By the end of this section, you will be able to:

Sections