Discusses at least five emerging threats to information security. Provides guidelines for creating strong passwords. Solution Information security means protecting information (data) and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. Information Security management is a process of defining the security controls in order to protect the information assets. 1.Any potential danger to information or systems. 2.A threat is a possibility that someone (person, s/w) would identify and exploit the vulnerability. 3.The entity that takes advantage of vulnerability is referred to as a threat agent. E.g.: A threat agent could be an intruder accessing the network through a port on the firewall. 4.Exploiting information via remote access software 5.Sharing sensitive files on P2P networks. 6.Careless use of wireless networks Use a unique password for each of your important accounts. Use a mix of letters, numbers, and symbols in your password. Don\'t use personal information or common words as a password..