Which step in the design and implementation of access control involves assessing unauthorized access to resources and determining the likelihood and impact of such events?
option A Access control policy
option B Risk assessment
option C Identification of assets
option D Monitoring and maintenance