Identify sources of harm to an IT system. (Natural, Human, Environmental)

Determine if any flaws exist in systems, policies, or procedures

Assigns values to risk probabilities, Impact values.

Determines risk probability that vulnerability will be exploited (High, Medium, Low)

By admin

Leave a Reply

Your email address will not be published. Required fields are marked *