Week 5 DB IN

Identify security threats that can occur during the electronic transmission of data. Point out how these could be mitigated by policies and procedures. Please offer specific examples in your response.