Summarize the primary vulnerabilities and potential threats that exist for GITI related to the practice of storing sensitive data on laptops. Use your answer to clarify the difference between vulnerabilities and threats (if there are any). In your opinion, which of the risks GITI faces are most significant to the company?