Discuss the process of identifying potential threats to an information asset
Discuss the process of identifying potential threats to an information asset. How can potential threats be identified? Comment on the usefulness of using established lists for a given industry as well as interviewing experts who have experience dealing with different types of threats.