Discuss various risk assessment methodologies the pros and the cons of each and then select one of the methodologies

Saudi Electronic University Intro to Cyber Security and Digital Crime Risk Assessment –

Risk Assessment

You are a senior information technology analyst at your employer and
you have been charged with the task of developing a detailed risk
assessment methodology. For this assignment, you will submit a report in
which you discuss various risk assessment methodologies, the pros and
the cons of each, and then select one of the methodologies and justify
your selection.

Your well-written paper should meet the following requirements:

  • Four to five pages in length, not including the title and reference pages.
  • Include two external references in addition to the textbook. The Saudi Digital Library is a good source for these references.
  • Your paper must follow Saudi Electronic University academic
    writing standards and APA style guidelines, citing references as
    appropriate.
  • You are strongly encouraged to submit all assignments to the
    Turnitin Originality Check prior to submitting them to your instructor
    for grading. If you are unsure how to submit an assignment to the
    originality check tool, review the Turnitin Originality Check Student
    Guide.

This is the textbook that I study from:

Emailing_Stallings,_William_Brown,_Lawrie_Computer_Security_Principles