If an organization must evaluate various information assets for risk management, which vulnerability should be evaluated first for additional controls? Which should be evaluated last? Support your answers with information and examples from your text and your experiences.