Work through the following materials this week:
Name and explain the for kinds of control measures required for database security.
Compare and contrast information security and information privacy.
Name and explain the security threats discussed in the article.