Explain how this framework is used to address the need to protect information in the company. Section 2: Create a table in your Microsoft® Word document listing a minimum of five threats to the company using the column headers Threat to Data-at-Rest, Confidentiality/Integrity/Availability, and Suggestion on Countering the Threat. In the Threat to Data-at-Rest column, list the threat. In the Confidentiality/Integrity/Availability column, identify whether each of the following are affected: Confidentiality Integrity Availability Some or all of the three (Confidentiality, Integrity, and/or Availability) In the Suggestions on Countering the Threat column, enter suggestions on how to counter each threat listed. Section 3: Add a 1- to 2-page recommendation outlining methods the company should consider to protect access to data, including recommendations for policies to be enacted that will increase data security.