Respuesta :

The Vulnerability Identification step of the SP 800-30 risk assessment process are vulnerabilities paired with threats. The SP 800-30 Risk Management Guide for Information Technology Systems provides an elaborate guidance on the various risk assessments.

The risk management  process is done based on set standards and recommended framework. The framework consists of guidance for conducting the risk assessments according to the parameter of NIST CSF. It can eventually be used to communicate risk to people working outside  the radar of information security.

The framework is such that it can be customized to suit the internet security protocols of a particular company, taking its needs and requirements into consideration.

To learn more about internet security, click

https://brainly.com/question/14832099

#SPJ4