IS KMS PICO PROTECTED TO IMPLEMENT? COMPREHENDING THE SECURITY THREATS