DELIVERABLESVulnerable Asset List - Submit the completed list of vulnerable assets Internal and External Threats List - submit the itemized list of threats External Inputs of Threats and Vulnerabiliti

Business Impacts and Probabilities Matrix

Paste your findings on vulnerable assets and threats into this table, and add the risk, the probability, and potential mitigation strategies. 

Your mitigation strategies should include all policies, processes, and technologies that can be used.

Asset

Threat

Risk

Probability

Mitigation Strategies

Note: You can add more rows to the bottom of the table if needed.