Risk Assessment is calculating the chance that Attackers might succeed, so you know how much effort to spend defending against them. There may be many different ways that you might lose control or access to your data, but some of them are less likely than others. Risk Assessment means deciding which Attacks you are going to take seriously, and which may be too rare, too harmless, or too difficult to combat to worry about. The Risks that are considered Acceptable risk)
Within the context of Information security there are two types of risk that companies face:
Of course these may overlap and any given risk may be both a Real Risk and a Regulatory RiskThe Probability of Loss occurrence appears to be high within the Threat landscape
Risk Assessment within the API Economy, where almost all Protected Resources are accessible in a programmatic method, and Credential Leakage may occur from many DataStores adds to the Complexity of Authentication !! More Information There might be more information for this subject on one of the following: