A. Implementation of effective countermeasures 2. Ensuring that risk is managed 3. Analysis of the current state of security in the target environment 4. Strategic analysis of risk
Answer a:
Fundamental applications of risk assessment to be addressed
include (1) determining the current status of information security in the target environment(s) and ensuring that associated risk is managed (accepted, mitigated, or transferred) according to policy, and (2) assessing risk strategically.