https://1library.org/document/dzx17doy-risk-assessment-generated-usage-ict-information-security-measures.html