IS risk analysis
• Identify assets and their owners
• Identify threats
• Identify vulnerabilities that threats could exploit
• Identify the probabilities and impacts of risks
• Assess the impact on operations
• Assess the real probability of a security failure
• Estimate the level of risks
• Determine the acceptability of risks or their management according to established criteria