Tag 1. Analyze the security mechanisms needed to protect the DMS systems from both state employees and users accessing over the Internet.