The report emphasizes on the risk assessment in cyber security and how various organizations are vulnerable to the attacks of the intruders and how the data and other credentials can be maintained and secured from such attacks and threats. It discusses the importance of risk assessment, difficulties in risk assessment, identification of critical assets, identification of threats, assessment of threats, vulnerabilities, and conclusion. The subject is cyber security and the document type is a report.