1111单位:1111系统安全项目信息安全风险评估报告我们单位名日期报告编写人:日期:批准人:日期:版本号:第一版本日期第二版本日期终板目录1概述.......................................................................................................................................31.1项目背景.....................................................................................................................31.2工作方法.....................................................................................................................31.3评估范围.....................................................................................................................31.4基本信息.....................................................................................................................32业务系统分析.....................................................................................................................42.1业务系统职能............................................................................................................42.2网络拓扑结构............................................................................................................42.3边界数据流向............................................................................................................43资产分析..............................................................................................................................53.1信息资产分析............................................................................................................53.1.1信息资产识别概述...............................................................................................53.1.2信息资产识别........................................................................................................54威胁分析..............................................................................................................................64.1威胁分析概述............................................................................................................64.2威胁分类.....................................................................................................................74.3威胁主体.....................................................................................................................74.4威胁识别.....................................................................................................................75脆弱性分析..........................................................................................................................85.1脆弱性分析概述........................................................................................................85.2技术脆弱性分析........................................................................................................95.2.1网络平台脆弱性分析..........................................................................................95.2.2操作系统脆弱性分析..........................................................................................95.2.3脆弱性扫描结果分析..........................................................................................95.2.3.1扫描资产列表...............................................................................................95.2.3.2高危漏洞分析...........................................