Identification should include how BYOD practices can expose a network to malware and other threats, creating additional vulnerabilities in a number of ways, such as