An acquaintance recently posed a practical question about security procedures to me and it may be useful as an example of risk analysis. “Howard” (not the real name) wrote: “I need some guidance on a ...