Answers

Answers

1) Protection, reaction, and detection.

2) Use different passwords for all accounts.

3) Theft of direct identification.