Prepare a 3- to 5-page risk assessment of your organization or an organization with which you are familiar.
Include how the formula for risk can be applied to the organization.
Describe how risk assessment is related to security controls or safeguards.
Include the following in your assessment that is part of Figure 14.3, Risk Assessment Methodology, of the Stallings and Brown textbook Computer Security (p. 478):
- System characterization
- Threat identification
- Vulnerability identification
- Control analysis
- Likelihood determination
- Impact analysis
- Risk determination