Assume that a security model is needed for protection of information in your class. Using theNSTISSC model, examine each of the cells (i.e. 27 cells associated with McCumber model)and write a brief statement on how you would address the three components represented in