Figure 1 is an interactive activity. This activity allows the learner to match security threats and vulnerability scenarios with the appropriate type of threat (Information theft, Identity theft, Data loss, and Disruption of services). Figure 2 is an interactive activity. This activity allows the learner to match security management practices with their management type (Hardware, Environmental, Electrical, and Maintenance).