User authentication is controlled by Windows 2008 Active Directory and users must authenticate by using a smart card and entering a PIN. Discretionary access control methods are in use.List and assess three security threats faced by the information technology systems and list and describe 1 security control needed that would be appropriate to address each threat