What are security vulnerabilities? What is a security threat? Give some examples of security vulnerabilities in different IS components.

 Define the concept of a data dictionary, and discuss the different types of data dictionaries. If you managed an organization’s entire data set, what characteristics would you want for the data dictionary?