Cyber threat assessment

There are several risk assessment methodologies in the internet. Some of them are basic, some are like rocket science. I found that none of them really was the level of detail I wanted to use, also I wanted something instant, so I decided to do it on my own. As it is custom, it fits to my needs much better than starting a project.

I took the time during the weekend to organize my thoughts about cyber threats into a spreadsheet. However it is in a very early stage, I wanted to share it, might be useful for others.

It is very limited scope, sometimes subjective, there are more to add to it. But, this is a start if you need an idea what to list or how to list, or maybe how not to:).

Versions will be submitted here below: