Describe the different threats to data

security.

. How can companies protect information

from destruction and unauthorized use?

 

 Why are privacy rights advocates alarmed

over the use of techniques such as data

warehouses and data mining?