Security officers should also consider different vectors of information safety such as safe information creation…