Recently, the rapid advances in information and communication and network technology and the expansion of digital convergence are changing to ubiquitous network society. Ubiquitous society, expand the temporal and physical space and develops many good thing. but, Hacking, cyber crime, increased privacy, and many problems will occur. In this study, the selection criteria for the appropriate authentication method for developing risk assessment procedures of the service is provided to step 4. (Services, and risk identification step, evaluation of risk-occurrence, evaluation of the extent of damage, Assessment of the level of risk) So, we can easily use the importance and risk to evaluate numerical value of the final risk result.