Please read and review attached file before answering.
- Identify the primary security risks and threats your distributed system might face. Research and include threats such as phishing, Internet scams, etc.
- Determine the severity level of the risks and threats in terms of likelihood and impact on the business.
- Based on the likelihood and impact of the security threats, determine the order in which threats should be addressed, and prepare an action plan to reduce the impact of each risk/threat listed in priority order.