Answers
Answers
1) Protection, reaction, and detection.
2) Use different passwords for all accounts.
3) Theft of direct identification.