("Information System Information Security Risk Assessment Report Format" Template Catalog 1. Overview of risk assessment projects 1.1 Overview of engineering projects 1.1.1 Basic information of construction projects 1.1.2 Basic information of construction units 1.1.3 Basic information of contractors 1.2 Basic conditions of risk assessment implementation units 2. Overview of risk assessment flow 2.1 Risk assessment work arrangement and management 2.2 Risk assessment work process 2.3 Technical standards and relevant regulatory documents based on 2.4 Guarantees and restrictions 3.1.3 Subsystem composition and classification Type of property 4.1.2 Property assignment 4.2 Description of important property Vulnerability Identification and Analysis 6.1 General Vulnerability Delineation 6.1.1 Management Vulnerability 6.1.2 Network Vulnerability 6.1.3 System Vulnerability 6.1.4 Usage Vulnerability 6.1.5 Data Management and Storage Vulnerability 6.1.6 Operation and Maintenance Vulnerability 6.1 .7 Disaster Preparedness and Emergency Response Vulnerability 6.1.8 Physical Vulnerability 6.2 Special Vulnerability Detection 6.2.1 Trojan Horse Virus Special Detection 6.2.2 Infiltration and Attack Special Test 6.2.3 Important Equipment Security Special Test 6.2.4 Equipment Acquisition 6.2.5 Special inspections for and maintenance services 6.2.6 Comprehensive verification of safety protection effects 6.3 Comprehensive list of vulnerabilities .2 Hazard level statistics 7.2.3 Hazard ranking based on vulnerability 7.2.4 Analysis of risk results 8. Comprehensive analysis and evaluation 9. Rectification opinions Annex 4: Threat assignment table Annex 5: Vulnerability analysis assignment table)