. What factors have brought an increased emphasis on network security?  

. Briefly outline the steps required to complete a risk assessment.

. Name and describe the main impact areas. Who should be responsible for assessing what is meant by low/medium/high impact for each of the impact areas? 

Explain your answer.