How To Identify Business Assets at Risk of a Cyber Attack