Prepare a 3- to 5-page risk assessment of your organization or an organization with which you are familiar.
Include how the formula for risk can be applied to the organization.
Describe how risk assessment is related to security controls or safeguards.
Include the following in your assessment that is part of Figure 14.3, Risk Assessment Methodology, of the Stallings and Brown textbook Computer Security (p. 478):
System characterization
Threat identification
Vulnerability identification
Control analysis
Likelihood determination
Impact analysis
Risk determination