1. National Institute of Standards and Technology (NIST). (2012). Guide for Conducting Risk Assessments (NIST Special Publication 800-30
Revision 1). Section 2.1
Page 5. This document establishes the foundational concepts of risk
stating that risk is "a function of the likelihood of a given threat-source’s exercising a particular potential vulnerability
and the resulting impact of that adverse event on the organization." The impact is inherently tied to the organization's assets.
2. Massachusetts Institute of Technology (MIT) OpenCourseWare. (2014). 6.858 Computer Systems Security
Fall 2014. Lecture 1: Introduction and Threat Models. Slide 20. The lecture slides present the risk formula as "Risk = Threat x Vulnerability x Cost
" where "Cost" represents the value of the asset being impacted.
3. Stoneburner
G.
Goguen
A.
& Feringa
A. (2002). Risk Management Guide for Information Technology Systems (NIST Special Publication 800-30). Section 2.2
"Risk Assessment
" Figure 2-1. This earlier version explicitly shows the relationship where a Threat-source
if motivated
may exploit a vulnerability
causing an impact on an asset
which constitutes a risk.