Identify a key resource or asset that you feel is not adequately protected. What makes your selection a key resource or asset? What are the reasons you feel the asset or resource is not adequately protected and what changes can be made to improve the overall security posture?