Perform an abbreviated risk management study on your personal computer. Conduct an asset identification, threat identification, vulnerability ap- praisal, risk assessment, and risk mitigation. Under each category, list the elements that pertain to your system. What major vulnerabilities did you uncover? How can you mitigate the risks? Write a one-page paper on your analysis.