Describe threats that specifically target confidentiality on a data system. Do not limit yourself to the textbook for answers, and use external resources to support your conclusion.7. What are the components of two-factor authentication ? Provide examples to support your answer.8. Why are database views important and how are they beneficial in a DBMS ?9. Explain the advantages and disadvantages of operating in the cloud environment. how does this affect data security at rest and in transit ?Please provide 2-3 paragraphs of information for each question. Please also be original in content as I will check for plagiarism.