5. 2. Define vulnerabilities
It is now necessary to define the level of
vulnerability for each threat
Vulnérability Level
All possible measures are taken and are effective 1
Measures are in place but do not effectively address the
threats
2
No measures are in place 3
6. 3. Define the impact on people and
operations
Assess the impact that the occurrence of a
threat would have
Impact Level
Risk of minor injuries with no need for treatment /
negligible delay in operations
1
Risk of injuries requiring friendly care without lasting
sequelae / Significant delay in operations
2
Risk of loss of life or serious injury resulting in long-term
sequelae / Cancellation of operations. 3
7. Calculate the risks associated with your activity
Using the matrix below, calculate the risk
level: R = M xV x I
Threat Threat level Vulnerability
level
Impact on
operations
and
employees
Risk (/27)
M 1 2 3 3 18
M 2 2 3 1 6
M 3 2 1 2 4
8. Calculer les risques liés à votre activité
Using the matrix below, calculate the risk level: R = M xV x I
Vulnérabilité
Impact
1 2 3
1
2
3
10. To do security
We need information...
• How do we find it?
• What is the difference between information
and rumour?
• How can we use the information we collect
effectively?
11. Information management
Sources of information
List the sources of information
How do you categorise them
How do you ensure that the information is
reliable.
Editor's Notes
Sources d’information
Réseaux (perso, pro, public)
Catégoriser (recoupement de réseaux)
Sources d’information
Réseaux (perso, pro, public)
Catégoriser (recoupement de réseaux)