Discussion: Identifying Potential Threats
Discuss the process of identifying potential threats to an information asset. How can potential threats be identified? Comment on the usefulness of using established lists for a given industry as well as interviewing experts who have experience dealing with different types of threats.
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.