(This work guideline is based on the evaluation steps and evaluation process of the rules in the document "Information Security Risk Evaluation Guidelines (Draft for Comment)" (Guo Xin Ban Zong [2006] No. 9), and provides further details on the specific content and methods in the information security risk evaluation process. Description, to provide reference for my various arrangements or units in the development of information security risk assessment related work. Chapter 1 Scope of Application Model??10....Chapter 7 Risk Assessment Quality Control??317.1 Risk Assessment Project Arrangement??317.2 Strengthening Project Assessment??317.3 Risk Control During Risk Assessment??327.4 Request for Risk Assessment Documentation??327.5 Exchange with exchange??33)