DELIVERABLESVulnerable Asset List - Submit the completed list of vulnerable assets Internal and External Threats List - submit the itemized list of threats External Inputs of Threats and Vulnerabiliti
Business Impacts and Probabilities Matrix
Paste your findings on vulnerable assets and threats into this table, and add the risk, the probability, and potential mitigation strategies.
Your mitigation strategies should include all policies, processes, and technologies that can be used.
Asset | Threat | Risk | Probability | Mitigation Strategies |
Note: You can add more rows to the bottom of the table if needed. |