Problem
Perform an abbreviated risk management study on your personal computer.
Conduct the following:
Asset identification
Threat identification
Vulnerability appraisal
Risk assessment
Risk mitigation.
Under each category, list elements that pertain to your system.
What major vulnerabilities did you uncover? How can you mitigate the risks?