What types of decisions do users need to make by accessing the information systems?

What are the different levels of information groups?

Describe the various threats and security threats to the proposed information system. What security controls are required to address the threats?