IT Security - Intosai Community

The end result is an individual assessment - sometimes referred to as a “security requirement” - for each type of threat that could affect the system in question. Security requirements are used to provide a basis for the following “risk management” process. The nature of “risk” Risk is a combination of threat, vulnerability and impact. ................
................