It is not possible for an organization to completely safeguard all of its assets at all times. There are limitations on resources, a balance between security and usability, and many other considerations.
Respond to the following questions:
How would you evaluate critical infrastructure within an organization to determine if it is susceptible to computer crime?
Who should be involved in the evaluation? Specify the designations or job responsibilities.
What factors should be taken into account when evaluating infrastructure for exposure to computer crime?