Consider a business you are familiar with, one which utilizes the networks and computers in order to support the business functions. Generate a list of ten significant, specific items like disks, computers, equipment, and information like sales data, client data, and the network configuration. Recognize the threats these significant items are subject to and deduce the security policy in order to mitigate that threat.