Strictly following the GB/T 20984 standard methodology, we systematically identify assets, threats, and vulnerabilities. By quantitatively analyzing the impact scope of vulnerabilities and potential business losses, we generate risk profiles and remediation priority matrices to meet compliance requirements such as ISO 27001, providing decision-making support for security system construction.