This report provides a comprehensive IT risk assessment, evaluating vulnerabilities, threats, and mitigation strategies within an information management system. It begins with an introduction highlighting the importance of risk assessment in safeguarding data from technological advancements and hacking attempts, and emphasizing the role of IT security in data protection. The report details the purpose and scope of the assessment, outlining testing methods, including the use of tools like NIST and NSA guidelines, and describes the risk assessment methodology, which includes resource analysis, threat identification, and countermeasure implementation. A system description is provided, emphasizing the use of secure Cisco routers and firewalls within an intranet environment. The report also covers the information management system, the responsible IT security team, and a table outlining potential threats, categorizing them as those caused by fires, water damage, espionage, theft, hacking, malicious code, eavesdropping, data integrity loss, fraud, power disruptions, hardware denial of service, and program errors. The report concludes by reiterating the significance of regular audit reports and the importance of risk assessment in implementing new security policies, with a list of references to support the analysis.