Risk identification
To reduce risks to an acceptable level
Risk avoidance
Threats are potential harm, vulnerabilities are weaknesses
Risk assessment
To address risks appropriately
Risk transfer
To track and manage risks
Budget
Risk monitoring and review