What are security vulnerabilities? What is a security threat? Give some examples of security vulnerabilities in different IS components.

 Define the concept of a data dictionary, and discuss the different types of data dictionaries. If you managed an organization’s entire data set, what characteristics would you want for the data dictionary?

What characteristics do a CASE tool and a DBMS have in common? How can those characteristics be used to enhance data administration?