1. The Institute of Internal Auditors (IIA)
Global Technology Audit Guide (GTAG) 1: Information Technology Risk and Controls
2nd Edition
2012. Page 6 discusses the IT risk assessment process
which begins with identifying critical IT assets and understanding their value to the business as a key step in determining risk.
2. National Institute of Standards and Technology (NIST)
Special Publication 800-30 Revision 1
Guide for Conducting Risk Assessments
2012. Section 2.2.1
"Risk Factors
" explicitly identifies asset value as a component in determining the adverse impact of a security event. The greater the value
the higher the potential impact and overall risk.
3. The Institute of Internal Auditors (IIA)
Global Technology Audit Guide (GTAG): Assessing Cybersecurity Risk: Roles of the Three Lines of Defense
2016. Page 5 states
"The board and senior management should understand that the organization’s cybersecurity program must be tailored to its specific operational and threat environment." This directly refutes the idea that risks are identical across organizations (Option A).
4. ISACA
COBIT 2019 Framework: Introduction and Methodology
2018. The framework's core principles link the governance and management of information and technology to value creation for the enterprise. It emphasizes managing risk to an acceptable level to achieve strategic objectives
not that risk management alone assures success (Option C).