Return to Article Details Vulnerabilities and threats in information assets