9/7/202SCIENCE|TECHNOLOGY|INNOVATION|BUSINESS|DESIGNSCIENCE|TECHNOLOGY|INNOVATION|BUSINESS|DESIGNReadings in support ofQualitative Risk AssessmentUnit texts:1.Gibson, Darril, Chapter 5 Defining Risk Assessment Approaches.ManagingRisk in Information Systems. 2015.2.Whitman, Michael E. annd Mattord, Herbert J.Chapter 6 Risk Management,Risk Assessment.Management of information security. Sixth Edition.,Stamford, Conn. : Cengage Learning, 2019.Suggestionsfrom additional reading list1.Schmittling, R. & Munns, A.Performing a Security Risk Assessment, ISACAJournal, 2010,Volume 1,-1/Pages/Performing-a-Security-Risk-Assessment1.aspx2.Thomas R. Peltier (2004) Risk Analysis and Risk Management, InformationSystems Security, 13:4, 44-56,Swinburne Library link:px?direct=true&db=a9h&AN=14451647&site=ehost-live&scope=site (Linksto an external site.)Links to an external site.SCIENCE|TECHNOLOGY|INNOVATION|BUSINESS|DESIGNSCIENCE|TECHNOLOGY|INNOVATION|BUSINESS|DESIGNSCIENCE|TECHNOLOGY|INNOVATION|BUSINESS|DESIGNCase Report Part A: is all about identifying & assessingTake a step wise approach & use these steps to model your assignment:You are an external auditor hired by VGB to complete and report on an overallsecurity risk assessment for the organisation:üPropose a target risk appetite and risk tolerance level for the TSF (week 3),üIdentify the key roles and responsibilities of individuals and departments withinthe organization as they pertain to risk assessment (week 4),üCarefully audit the case evidence, undertake an inventory and identify