Risk Assessment Methodology
Student’s Name
Institutional Affiliation
Course
Instructor
Date
, 2
Risk Assessment Methodology
The processing of assessing risks in an organization is comprehensive, and requires a
systematic approach. A detailed overview of the risks, threats and recommendations depends on
the assessment approach or methodology used. The methodology process is summed up in four
steps, including preparing for and conducting the assessment, reporting the assessment results and
maintaining or monitoring the assessment. This paper provides an overview of how Bureau of
Research and Intelligence (BRI) risk assessment will be conducted.
Preparing For the Assessment
The initial step in preparing for the risk assessment for BRI is identifying the purpose and
scope of the process. The following steps include identifying the assumptions and constraints of
the process and the sources of the threats, vulnerabilities and impact data. The last step in this part
is defining the risk models or assessment approach to be used in the risk assessment (Roper, 1999).
This is a crucial step that will determine the subsequent processes’ outcomes.
Conducting the Risk Assessment
This is the second step in the methodology where risk assessment is conducted. The priority
includes producing and prioritizing the security risks. It incorporates analyzing the presenting
risks, threats and vulnerabilities in the organization. Essential data is collected after identifying the
sources of relevant threats to determine the potential threats. The vulnerabilities that could be
exploited using the threats are identified, and the likelihood of the threats occurring is determined
(Ross, 2012). The next step is to determine the adverse impacts to the organization, including
effects on its operations and assets and how it will affect all the other stakeholders.
Communicating and Sharing Risk Assessment Information