Think about a business you are familiar with, one that uses networks and computers to support business functions. Create a list of ten important, specific items such as computers, disks, equipment, and information such as sales data, client data, and network configuration Identifying the threats these important items are subject to and devise a security policy to mitigate that threat.