questionPhase 2 is to identify Solutions three (3) types of threat to a Secure System. Phase 2 is to identify Solutions three (3) types of threat to a Secure System.