Which of the following is a fundamental principle of threat & vulnerability assessment as it applies to Certified Security Investigator?