Which law of operations security discusses the need to evaluate our information assets and determine what we consider to be critical information?

A. The first law of operations security.
B. The second law of operations security.
C. The third law of operations security.
D. The fourth law of operations security.