CARVIEW |
Select Language
HTTP/2 200
cache-control: max-age=300, public, stale-while-revalidate=30
content-type: text/html; charset=utf-8
etag: W/"b01b0512412800124fa0903e0e32ba1b"
last-modified: Mon, 06 Mar 2023 21:22:37 GMT
link: ; rel=preload; as=style; nopush
referrer-policy: strict-origin-when-cross-origin
x-content-type-options: nosniff
x-download-options: noopen
x-frame-options: SAMEORIGIN
x-permitted-cross-domain-policies: none
x-request-id: 445124ed-bd9c-4fa8-8484-ccda2e50ac1f
x-runtime: 0.047114
x-xss-protection: 0
accept-ranges: bytes
age: 0
date: Tue, 07 Oct 2025 09:45:25 GMT
via: 1.1 varnish
x-served-by: cache-bom-vanm7210024-BOM
x-cache: MISS
x-cache-hits: 0
x-timer: S1759830324.861329,VS0,VE1312
strict-transport-security: max-age=300
content-length: 18921
Risk assessment | Surveillance Self-Defense
Skip to main content

Surveillance
Self-Defense
Self-Defense
Risk assessment
In computer security, risk analysis is calculating the chance that threats might succeed, so you know how much effort to spend defending against them. There may be many different ways that you might lose control or access to your data
, but some of them are less likely than others. Conducting a risk assessment means deciding which threats you are going to take seriously, and which may be too rare or too harmless (or too difficult to combat) to worry about. See threat modeling
.