Fundamental applications of risk assessment to be addressed
include (1) determining the current status of information security in the target environment(s) and ensuring that associated risk is managed
(accepted, mitigated, or transferred) according to policy, and (2) assessing
risk strategically.