Password procedures, information encryption software, and firewalls are examples of measures taken to address:
A. Workplace violence threats.
B. Access and security control threats.
C. Criminal and terrorist threats.
D. Information and cyber threats.