identifying potential threats to an information asset

Discuss the process of identifying potential threats to an information asset. How can potential threats be identified? Comment on the usefulness of using established lists for a given industry as well as interviewing experts who have experience dealing with different types of threats. 

find the cost of your paper