In an information system, which of the following can show the potential paths to the objects attackers are ultimately interested in _______?
1) Assets
2) Security silos
3) Policies
4) Topologies