It is critical that all threats are identified as threats will exist where IT might not have the ability to influence security decisions. Example could include Physical Security that might be controlled at the building level by facilities.
©Copyright IBM Corp. 2005, 2008. All Rights Reserved.