1. How does technological obsolescence constitute a threat to information security? How can an organization protect against it?
2. Does the intellectual property owned by an organization usually have value? If so, how can attackers threaten that value?