Fig. (1) The needs for and improvement cycle of data Security Management.