it involves various types of categories of controls, such as technical, procedural/administrative and physical. Data Security Requirements? Unauthorized or unintended activity or misuse by authorise database users, database administrators, or network/system managers, or by unauthorized users or hackers eg in appropriate access to sensitive data, metadata or function within databases, or inappropriate changes…