Briefly identify and describe a mitigating strategy for the risks below:
System access control (Authentication Issues)
System development and maintenance (Coding Vulnerabilities)
Physical and environmental security (Physical Threats)
Computer and network Management (Network Issues)