Password procedures, information encryption software, and firewalls are examples of measures taken to address:
A. Access and security control threats.
B. Information and cyber threats.
C. Criminal and terrorist threats.
D. Workplace violence threats.