Resources

Step 2: Identify threats to the system