This assignment delves into the realm of information security, examining prevalent threats like denial-of-service attacks, hacking, phishing, and ransomware. It emphasizes the distinction between active and passive attacks, highlighting the severity of data breaches caused by active threats. The core focus is on risk assessment – a structured process for identifying, analyzing, and prioritizing potential risks associated with information systems. This process involves evaluating the likelihood and impact of various threats to guide organizations in implementing effective security measures and mitigating vulnerabilities.