Justify your selections by explaining the security threats these items may pose to the organization. Discuss information assurance industry standards in your justification. How likely do you think these threats are to occur in a real world organization?