Impact Analysis: The next major step in measuring level of risk was to determine the adverse impact resulting from successful exploitation of vulnerability. The adverse impact of a security event can be described in terms of loss or degradation of any, or a combination of any, of the following three security goals:
Loss of Confidentiality – Impact of unauthorized disclosure of sensitive information (e.g., Privacy Act).
Loss of Integrity – Impact if system or data integrity is lost by unauthorized changes to the data or system.
Loss of Availability – Impact to system functionality and operational effectiveness. The user domain can be assessed by training them properly and the impact can damage the integrity of the company. Workstation domain can be assessed by keeping up with the systems and updating the when needed. LAN to WAN domain can be assessed by keeping good firewall restrictions and implementing them the impact could escalate to network downtime. Remote access domain can be assessed by requiring two credentials from the three something you are, something you have and something you know. This can impact the data stored on the network as well as the network itself.