Discussion
In regards to information security, discuss how threat identification should be performed within your organization or university. Should every threat be planned for? Why or why not?
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.