Chapter 6 Chapter 6 Implement Threat Control Measures After identifying vulnerabilities and threats Implement threat control measures Identify level of protection Initial…