This document discusses security risk assessment for a group project. It lists the group members and outlines the 8 steps to perform a security risk assessment. These include identifying assets, threats, likelihood and impacts of threats, and mitigation options. It emphasizes the importance of a complete inventory and using qualified experts. The document also covers defining security policies, prevention methods like firewalls and antivirus software, detection using IDS, and response including documentation, containment and follow up reviews.