Measure threats, vulnerabilities, impacts, and controls on dashboard. View scores, charts, and exportable reports instantly. Support smarter cybersecurity planning with clear evidence every review.
Use 1 to 5 scales for qualitative ratings. Higher numbers indicate greater exposure or impact.
| Asset | Asset Value | Threat | Vulnerability | Control % | Residual Score | Priority |
|---|---|---|---|---|---|---|
| Customer Database | $500,000 | 4 | 4 | 30% | 53.20 | Priority Action |
| Public Web Server | $120,000 | 3 | 3 | 60% | 14.40 | Monitor |
| Finance ERP | $900,000 | 5 | 4 | 45% | 49.50 | Priority Action |
This approach combines qualitative security scoring with financial loss estimation, which makes prioritization easier for governance, operations, and budgeting decisions.
Residual risk is the remaining risk after existing security controls are considered. It helps teams understand whether current safeguards lower exposure enough or whether more treatment is still needed.
A normalized score supports prioritization across many assets. ALE adds financial context, helping decision makers compare remediation cost against expected annual loss.
There is no universal number. Higher effectiveness suggests stronger mitigation, but the value should come from audits, testing, monitoring outcomes, and real control performance evidence.
No. It is a practical screening and prioritization tool. Formal assessments still need scope review, asset inventories, threat intelligence, stakeholder input, and documented risk acceptance.
Define scoring criteria internally. For example, 1 can mean minimal impact or rare likelihood, while 5 can mean severe impact or very probable occurrence.
Exposure factor estimates the percentage of asset value lost if the event happens once. It reflects direct, indirect, operational, and recovery-related loss.
Some low-scoring risks still deserve attention because of legal obligations, sensitive data handling, customer commitments, or concentration risk across multiple related systems.
Recalculate after major incidents, architecture changes, control upgrades, audit findings, vendor changes, or whenever threat conditions and business impact assumptions shift.
Important Note: All the Calculators listed in this site are for educational purpose only and we do not guarentee the accuracy of results. Please do consult with other sources as well.