1. "Describe the relationship between privacy and IT. Discuss some of the threats to information security and some of the measures you can take to protect information resources.
2. Find an article online that discusses strategies for securing information technolgoy. Summarize the key points in the article. Be sure to include the url.