When looking at the threat landscape, there are different
types adversaries and they pose different types of threats
depending on their capabilities, intentions, and the assets they
are targeting. For example, nation states might target research
companies or military websites trying to steal confidential and
proprietary data. In addition, companies react to the loss of
assets differently. The level and types of mitigation strategies
will vary among organizations depending on whether there is a loss
of one asset or of...