The University of SydneyPage 35NIST’s Seven Steps process for an Effective Security Program–Step 1: Prioritize and Scope.–Identify Program Scope, Goals, and Objectives–Step 2: Orient. –Identifies related systems and assets, regulatory requirements, and overall risk approach. –Consults sources to identify threats and vulnerabilities applicable to those systems and assets. –Step 3: Create a Current Profile. –Develops a Current Profile by indicating which Category and Subcategory outcomes from the Framework Core –Step 4: Conduct a Risk Assessment. –Analyzesthe operational environment in order to discern the likelihood of a cybersecurity event and the impact