ways to limit security threats. Then write a 2- to 3-page analysis of the identity

the “5. LifeLock: Keeping Your Identify Safe” scenario in the “Making Business Decisions” section of “Business Plug-Ins B6 Information Security” in . Based on the scenario, do additional to identify ways to limit security threats. Then write a 2- to 3-page analysis of  the identity scenario by answering the following questions: