Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
3Activity

Table Of Contents

PURPOSE, CAUTIONS & FORMAT
EXAMPLE RISK ASSESSMENT
1 INTRODUCTION
1 Introduction
Table A: Risk Classifications
2 IT SYSTEM CHARACTERIZATION
Table B: IT System Inventory and Definition
3 RISK IDENTIFICATION
3 Risk Identification
4 CONTROL ANALYSIS
4 Control Analysis
Table E: Security Controls
Table F: Risks-Controls-Factors Correlation
5 RISK LIKELIHOOD DETERMINATION
5 Risk Likelihood Determination
Table G: Risk Likelihood Definitions
Table H: Risk Likelihood Ratings
6 RISK IMPACT ANALYSIS
6 Risk Impact Analysis
Table I: Risk Impact Rating Definitions
Table J: Risk Impact Analysis
7 OVERALL RISK DETERMINATION
7 Overall Risk Determination
Table K: Overall Risk Rating Matrix
Table L: Overall Risk Ratings Table
8 RECOMMENDATIONS
8 Recommendations
9 RESULTS DOCUMENTATION
Exhibit 1: Risk Assessment Matrix
0 of .
Results for:
No results containing your search query
P. 1
Risk Assessment Instructions 12142006

Risk Assessment Instructions 12142006

Ratings: (0)|Views: 90 |Likes:
Published by rootmen6332

More info:

Published by: rootmen6332 on May 21, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

04/18/2014

pdf

text

original

You're Reading a Free Preview
Pages 4 to 22 are not shown in this preview.
You're Reading a Free Preview
Pages 26 to 72 are not shown in this preview.

Activity (3)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
Begüm Taş liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->