Identifying other risks and threats to systems.

Identification should include

  • wireless rogue networks
  • bring-your-own device (BYOD)
  • Internet of things (IoT) devices.